Distributed Computer and Communication Networks: Control, Computation, Communications: 23rd International Conference, DCCN 2020 Moscow, Russia, September 14–18, 2020 Revised Selected Papers 3030662411, 9783030662417

This book constitutes the refereed proceedings of the 23rd International Conference on Distributed and Computer and Comm

207 102 52MB

English Pages 568 [569] Year 2021

Report DMCA / Copyright

DOWNLOAD FILE

Polecaj historie

Distributed Computer and Communication Networks: Control, Computation, Communications: 23rd International Conference, DCCN 2020 Moscow, Russia, September 14–18, 2020 Revised Selected Papers
 3030662411, 9783030662417

Table of contents :
Preface
Organization
Contents
Computer and Communication Networks
Challenges and Performance Evaluation of Multicast Transmission in 60GHz mmWave
1 Introduction
2 IEEE 802.11ad/ay Specifications
2.1 IEEE 802.11ad
2.2 IEEE 802.11ay
3 Design Challenges of mmWave Multicast and Unicast Modes
3.1 Unicast in Directional Networks
3.2 Multicast in Traditional Networks
3.3 Multicast in Directional Networks
4 System Model
4.1 Antenna and Channel Models
5 Performance Analysis
5.1 Static Scenario: Unicast vs. Multicast Performance
5.2 Static Scenario: Coverage Area Estimation
5.3 Dynamic Scenario: Mobility Impact on Multicast Transmission
6 Conclusion
References
Deep Learning for IoT Traffic Prediction Based on Edge Computing
1 Introduction
2 Related Works
3 Problem Statement
4 Proposed System and Algorithm
4.1 Architecture of Deep Learning Implementation Based on Edge-Computing
4.2 Deep Learning Algorithm for IoT Traffic Prediction
5 Simulation Results
6 Conclusion and Future Work
References
On Optimal Placement of Base Stations in Wireless Broadband Networks to Control a Linear Section with End-to-End Delay Limited
1 Introduction
2 Problem Statement
3 Calculation of Link Distance and Coverage Radius of Stations
4 Tandem Queue Model for End-to-End Delay Evaluation
5 Integer Linear Programming Model
6 Example
6.1 Computation of the Communication Link Distance Between Base Stations
6.2 Computation of the Coverage Radius
6.3 Time Delay Calculation
7 Conclusion
References
CPU vs GPU Performance of MATLAB Clustering Algorithms
1 Clustering Analysis
2 Clustering Algorithms in MATLAB
3 Benchmark Details
4 CPU Benchmark
5 GPU Benchmark
6 Performance per Ruble
7 Conclusion
References
High-Capacity Photon Switching Systems Based on the Two-Stage 256256 Switch
1 Introduction
2 The Quasi-Complete Photon 1616 Switch
3 The Two-Stage Photon 256256 Switch as the Basic Element of High-Capacity Photon Switching Systems
4 The Method of Invariant Scaling of Photon Switching Systems
5 Complexity Calculation
5.1 Circuit Complexity
5.2 Fiber Complexity
6 The Comparative Analysis
7 Conclusion
References
Investigation of the Guaranteed Traffic Rate in Enterprise WLAN
1 Introduction
2 Characteristics of Wireless Local Area Network
3 Performance Parameters of Wireless Local Area Network
4 Investigation of Wireless Channel Media Access Protocol
5 Model Formulation
6 Methodology for Guaranteed Delivery Rate Estimation
7 Conclusion
References
SARSA Based Method for WSN Transmission Power Management
1 Introduction
2 Related Work
3 Proposed Model and SARSA Based Method
3.1 Implemented Core Technologies – Modified Multi-layer Perceptron
4 Conclusions
References
Method of Frequency Coding in Microwave RFID
1 Introduction
2 Frequency Coding
3 Suppression of False Signals
4 Solution of Anticollision Problem
5 Conclusion
References
On Synchronisation of ISS-OFDM Signals
1 Introduction
1.1 ISS-OFDM Properties
1.2 Scope of the Paper
2 State of the Art
2.1 Time-Domain Synchronisation
2.2 SCO Estimation
3 Proposed Method
3.1 Time-Domain Tracker
3.2 SCO Estimator
3.3 Simulation Setup
4 Results and Discussion
5 Conclusion
References
Reserve Navigation System of Tether Powered Unmanned Aerial Platform in Conditions of Turbulent Atmosphere
1 Introduction
2 Main Laws for the Motion of the Tethered Aerial Vehicle
3 Coordinates of the Vehicle
4 Conclusion
References
Teleportation of the Bell States on IBM Q Computers Under Their Hardware Errors
1 Introduction
2 IBM Quantum Computers
2.1 Gates
2.2 Sources of Errors
3 Experimental Realization
3.1 CNOT Gates Implementation
3.2 IBM Q Yorktown
3.3 T-Shaped IBM Quantum Computers
3.4 IBM Q Rome and IBM Q Santiago
4 Conclusion
References
Management of Risks for Complex Computer Network
1 Introduction
2 General Model
3 The Arbitral Solution
4 Cognitive Game
5 Conclusion
References
Prerequisites and Methodology for Digital Transformation of 4G Networks into 5G Ecosystem
1 Introduction
2 Statement of the Problem
3 The Concept of 5G Ecosystem
4 Subsystems and Structure of RAN and CS Models
5 RAN Deployment Models
6 Stages of Transition to the Open O-RAN 5G Network
7 Conclusion
References
Analytical Modeling of Distributed Systems
The Simulation of Finite-Source Retrial Queueing Systems with Two-Way Communications to the Orbit and Blocking
1 Introduction
2 Model Description and Notations
3 Simulation Results
3.1 Squared Coefficient of Variation is Greater Than One
3.2 Squared Coefficient of Variation Is Less Than One
4 Conclusion
References
Token Based Parallel Processing Retrial Queueing System with a Probabilistic Joining Strategy for Priority Customers
1 Introduction
2 Model Description
3 Mathematical Formulation of the Model
4 Steady-State Analysis
4.1 Stability Condition
4.2 Steady-State Probability Vector
4.3 Performance Measures
5 Conclusion
References
A Disease Outbreak Managing Queueing System with Self-generation of Status and Random Clock for Quarantine Time
1 Introduction
2 Mathematical Model
3 Stationary Vector
4 Performance Characterestics
5 Departure Process of Customers from Pool
6 Conclusion
References
Stochastic Optimization of Local Purchase Quantities in a Geo/Geo/1 Production Inventory System
1 Introduction
2 Model 1
2.1 Stability Condition
2.2 Steady-State Analysis
3 Model II
3.1 Steady State Analysis
4 Model III
4.1 Steady State Analysis
5 Performance Measures
6 Distribution of Number of Local Purchase in Specified Time
7 Numerical Experiments
7.1 Cost Function
7.2 Graphical Illustrations
References
Mathematical Model of Horizontal VNF Scalability in virtualized Evolved Packet Core
1 Introduction
2 Background
3 System Model
4 Mathematical Model
5 Analytical Evaluation
5.1 Varying Queuing Size
5.2 Varying the Biggest Group Number
5.3 Varying Groups Count
5.4 Varying Group Service Rate
6 Conclusions
7 Appendix
References
The Method for User Localization in the Local Wireless Network in an Emergency
1 Introduction
2 Implementation Options
3 Model
4 Conclusion
References
Analysis of the Using of D2D Communications for the Ad Hoc Network Based on Subscriber Terminals
1 Introduction
2 Model
3 Conclusion
References
Channel Switching Threshold Strategies for Multichannel Controllable Queuing Systems
1 Introduction
2 Problem Statement
3 A-convexity in Discrete Problems of Optimization
4 Properties of Optimal Channel Switching Strategies
4.1 ``Myopic'' Strategies of Control
4.2 Broadening of the Notion of A-convexity
4.3 Multi-step Dynamic Problems of Channel Switching
5 Simulation Example
6 Conclusion
References
Modeling and Simulation of Reliability Function of a k-out-of-n:F System
1 Introduction
2 Problem Setting and Notation
3 Analytical Results for Reliability Function for 3-out-of-6 System
4 Simulation Results
5 Conclusion
References
Two Ways of Group Polling Method Application for Sensors Detecting in Unsynchronized Structured WSNs
1 Introduction
2 Setting of the Problem
3 Profiles for Signals of Active Sensors
4 Two Possible Ways of Group Polling Method Application for Sensors Detecting in Unsynchronized Structured WSNs
4.1 Structured WSN with Medium-Sized Objects
4.2 Structured WSN with Large Objects
5 Conclusions
References
Regeneration Analysis of Non-Markovian System with Simultaneous Service and Speed Scaling
1 Introduction
2 Description of a Model
3 Regenerative Structure
3.1 Regenerative Estimation in Discrete Time
3.2 Application for Speed Scaling System
4 Simulation
4.1 Pareto Service
4.2 Weibull Service
5 Conclusion
References
Integrated Tolerant Distributed Computing Network
1 Performance Model of the DCN with Non-restorable Computing Modules
1.1 Model of the Number of Virtual Computing Modules Depending on the Means of Ensuring Network Tolerance
1.2 DCN Performance Estimation Model
1.3 An Integrated Model of the DCN
2 Performance Model of the Tolerant DCN with Restorable Computing Modules
2.1 Statement of the Problem
2.2 System of Differential Equations for Studying the Transition Process of TDCN Behavior
2.3 System of Ordinary Equations for Studying the Behavior of TDCN for the Stationary Case
2.4 Evaluation of the Effectiveness of the Approximate Model
References
Asymptotic Analysis of RQ-System with Feedback and Batch Poisson Arrival Under the Condition of Increasing Average Waiting Time in Orbit
1 Introduction
2 The Model Description and the Problem Statement
3 Kolmogorov Equations
4 Asymptotics of the First Order
5 Asymptotics of the Second Order
6 Numerical Matrix Method
7 Numerical Results
8 Conclusion
References
On Comparison of Multiserver Systems with Two-Component Mixture Distributions
1 Introduction
2 Two-Component Mixture Distributions
3 Stochastic and Failure Rate Ordering of Two-Component Mixture Distributions
4 Stochastic and Failure Rate Comparison of Some Two-Component Mixture Distributions
5 Comparison of Multiserver Systems with Different Service Distributions
6 Numerical Examples
7 Conclusion
References
On Splitting Scenarios for Effective Simulation of Reliability Models
1 Introduction
2 Crude Simulation of the Degradation Process
3 Splitting Scenarios for the Degradation Process
3.1 Fully Branching Regeneration Splitting - Scenario a)
3.2 Standard Splitting Procedure - Scenario b)
4 Simulation Results
5 Conclusion
References
Ergodicity and Polynomial Convergence Rate of Generalized Markov Modulated Poisson Processes
1 Introduction
2 Some Preliminary Considerations
2.1 Some Information About the Coupling Method
2.2 Successful Coupling (See ch29zv5).
2.3 Basic Coupling Lemma (see, e.g., ch29zv13,ch29verbut,ch29zv1)
3 Lorden's Inequality
3.1 Generalized Lorden's Inequality
3.2 Some Preliminary Considerations About Generalized Intensities
3.3 Notations and Assumptions
4 Considered Generalized Markov-Modulated Poisson Process
4.1 Ergodicity of the Multi-dimensional Process Xt
4.2 About Polynomial Convergence of the Process Xt
5 Application for One Reliability System
6 Conclusion
References
The Mathematical Model for Calculating Physical Entity of DPI Analyser
1 Introduction
2 Related Work
3 DPI
4 The Mathematical Model
4.1 Formalization DPI Input Parameters
4.2 Ventcel-Ovcharov Model and DPI Analyser
4.3 Data Sets and Calculation
5 Simulation
6 Conclusion
References
The Overflow Probability Asymptotics in a Multiclass Single-Server Retrial System
1 Introduction
2 An Associated Buffered Multiclass System
2.1 Description of a Model
2.2 Analysis of a Large Deviation Probability
3 Numerical Examples
4 Conclusion
References
Wireless Channel Modeling and Simulation with K Distribution
1 Introduction
2 Model of Shadowed Fading Channel
3 K Distribution and Modified Bessel Functions
4 K-Fading Channel in Half Integer Case
5 Bit Error Rate for K-Fading Channel in Half Integer Case
6 Monte Carlo Simulation with K Distribution
7 Conclusion
References
Melanoma Detection Computer System Development with Deep Neural Networks
1 Introduction
2 Modern Results in Computer Recognition of Dermatoscopic Images
3 Data Description and Their Pre-processing
4 Building a Deep Neural Network Model and Computer Experiments
5 Conclusion
References
Distributed Systems Applications
Comparison of Different Smoothing Methods for Initial Data of the DSN-PC Sensor Network
1 Introduction
2 System and Model Description
2.1 Geographical Properties
2.2 Input Data Sources and Their Assimilation
2.3 The Applied Numerical Weather Prediction Algorithm
2.4 Smoothing the Initial Data
3 Results
4 Conclusion
References
NFC Vulnerabilities Investigation
1 Introduction
1.1 RFID Technologies
1.2 NFC Technology Vulnerabilities
2 Methodology of Experiments
3 Results
3.1 NFC Signal Interception Investigation
3.2 NFC Signal Jamming Investigation
4 Conclusions
References
Data Migration Rate of CRUSH-Based Distributed Object Storage with Dynamic Topology
1 Introduction
2 Program Simulation of Data Migration
3 CRUSH-Based Storage with Dynamic Topology
3.1 Topology in Open Storage Systems
3.2 Migration Ratio at Different System Load
3.3 General and Specific Storage Policies
3.4 DHT Approach
4 Conclusion
References
Reduction of the Energy Consumption on Preliminary Signal Processing in Vibration Monitoring Networks
1 Introduction
2 Structure of a Scaling Amplifier
3 Simulation
4 Discussion and Recommendations
5 Conclusion
References
Stability and Sustainability of Cryptotokens in the Digital Economy
1 Introduction
2 Cryptocurrency Mining
2.1 Quasi-legal Mining
3 Cryptocurrency and Value
3.1 Economic Role
3.2 Legal Framework
3.3 Theories of Value
4 Mining Impact
5 Solutions
6 Conclusion
References
Identification System Model for Energy-Efficient Long Range Mesh Network Based on Digital Object Architecture
1 Introduction
2 Identification Approaches in LoRa and Mesh Networks
3 DOA Based Identification
3.1 Digital Object Architecture
3.2 DOA as Identification System
3.3 DOA Based Identification for Mesh Networks
4 Queuing Model of Identification System for Mesh Network
5 Conclusion
References
Efficient Wireless Data Collection System Based on LoRaWAN Technology and Distributed Computation Approach
1 Introduction
2 The Intensive Data Collection Method
2.1 Client-Server Interconnection Logic
2.2 Data Prediction Method
3 System Architecture
4 Intensive Temperature Measurement of the Building Heat Pipes
4.1 Server Side
4.2 End Device Side
4.3 Equipment Layout
5 Simulation
6 Results and Further Research Area
7 Conclusion
References
Computing Load Distribution by Using Peer-to-Peer Network
1 Introduction
2 High-Performance Computing Overview
3 Concept
3.1 Mathematical Basis
3.2 Generalization
3.3 Equalization
3.4 Transparency
4 The Algorithmic Analysis
5 The Network
6 The Mechanism of Distribution
7 System Estimation
8 Conclusion
References
Firewall Simulation Model with Filtering Rules Ranking
1 Introduction
2 Method for Ranking Firewall Filtering Rules
3 Firewall Model with Filtering Rules Ranking
4 Designing of an Imitational FW Model with Rules Ranking
5 Evaluation of the Firewall Performance Indicators
6 Conclusion
References
Performance of Forward Error Correction in Transport Protocol at Intrasegment Level
1 Introduction
2 Transport Connection Model
3 Probabilistic and Temporal Characteristics of the Transport Connection
4 Areas of Appropriateness for Applying the Forward Error Correction
5 Conclusion
References
Author Index

Citation preview

Vladimir M. Vishnevskiy Konstantin E. Samouylov Dmitry V. Kozyrev (Eds.)

Communications in Computer and Information Science

1337

Distributed Computer and Communication Networks: Control, Computation, Communications 23rd International Conference, DCCN 2020 Moscow, Russia, September 14–18, 2020 Revised Selected Papers

Communications in Computer and Information Science Editorial Board Members Joaquim Filipe Polytechnic Institute of Setúbal, Setúbal, Portugal Ashish Ghosh Indian Statistical Institute, Kolkata, India Raquel Oliveira Prates Federal University of Minas Gerais (UFMG), Belo Horizonte, Brazil Lizhu Zhou Tsinghua University, Beijing, China

1337

More information about this series at http://www.springer.com/series/7899

Vladimir M. Vishnevskiy Konstantin E. Samouylov Dmitry V. Kozyrev (Eds.)

• •

Distributed Computer and Communication Networks: Control, Computation, Communications 23rd International Conference, DCCN 2020 Moscow, Russia, September 14–18, 2020 Revised Selected Papers

123

Editors Vladimir M. Vishnevskiy V.A.Trapeznikov Institute of Control Sciences of Russian Academy of Sciences Moscow, Russia

Konstantin E. Samouylov Peoples’ Friendship University of Russia (RUDN University) Moscow, Russia

Dmitry V. Kozyrev V.A.Trapeznikov Institute of Control Sciences of Russian Academy of Sciences Moscow, Russia Peoples’ Friendship University of Russia (RUDN University) Moscow, Russia

ISSN 1865-0929 ISSN 1865-0937 (electronic) Communications in Computer and Information Science ISBN 978-3-030-66241-7 ISBN 978-3-030-66242-4 (eBook) https://doi.org/10.1007/978-3-030-66242-4 © Springer Nature Switzerland AG 2020 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. This Springer imprint is published by the registered company Springer Nature Switzerland AG The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland

Preface

This volume contains a collection of revised selected full-text papers presented at the 23rd International Conference on Distributed Computer and Communication Networks (DCCN 2020), held in Moscow, Russia, September 14–18, 2020. The conference is a continuation of traditional international conferences of the DCCN series, which took place in Sofia, Bulgaria (1995, 2005, 2006, 2008, 2009, 2014), Tel Aviv, Israel (1996, 1997, 1999, 2001), and Moscow, Russia (1998, 2000, 2003, 2007, 2010, 2011, 2013, 2015, 2016, 2017, 2018, 2019) in the last 25 years. The main idea of the conference is to provide a platform and forum for researchers and developers from academia and industry from various countries working in the area of theory and applications of distributed computer and communication networks, mathematical modeling, methods of control and optimization of distributed systems, by offering them a unique opportunity to share their views as well as discuss the prospective developments and pursue collaboration in this area. The content of this volume is related to the following subjects: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13.

Communication networks algorithms and protocols; Wireless and mobile networks; Computer and telecommunication networks control and management; Performance analysis, QoS/QoE evaluation and network efficiency; Analytical modeling and simulation of communication systems; Evolution of wireless networks toward 5G; Internet of Things and Fog Computing; Machine learning, big data, artificial intelligence; Probabilistic and statistical models in information systems; Queuing theory and reliability theory applications; Quantum Information and quantum communication; High-altitude telecommunications platforms; Security in infocommunication systems.

The DCCN 2020 conference gathered 167 submissions from authors from 25 different countries. From these, 140 high-quality papers in English were accepted and presented during the conference. The current volume contains 43 extended mostly application-oriented papers which were recommended by session chairs and selected by the Program Committee for the Springer post-proceedings. All the papers selected for the post-proceedings volume are given in the form presented by the authors. These papers are of interest to everyone working in the field of computer and communication networks.

vi

Preface

We thank all the authors for their interest in DCCN, the members of the Program Committee for their contributions, and the reviewers for their peer-reviewing efforts. September 2020

Vladimir Vishnevskiy Konstantin Samouylov

Organization

DCCN 2020 was jointly organized by the Russian Academy of Sciences (RAS), the V.A. Trapeznikov Institute of Control Sciences of RAS (ICS RAS), the Peoples’ Friendship University of Russia (RUDN University), the National Research Tomsk State University, and the Institute of Information and Communication Technologies of the Bulgarian Academy of Sciences (IICT BAS).

International Program Committee V. M. Vishnevskiy (Chair) K. E. Samouylov (Co-chair) S. M. Abramov S. D. Andreev A. M. Andronov N. Balakrishnan A. S. Bugaev S. R. Chakravarthy T. Czachorski D. Deng A. N. Dudin A. V. Dvorkovich Yu. V. Gaidamaka P. Gaj D. Grace Yu. V. Gulyaev J. Hosek V. C. Joshua H. Karatza N. Kolev J. Kolodziej G. Kotsis A. E. Koucheryavy Ye. A. Koucheryavy T. Kozlova Madsen U. Krieger A. Krishnamoorthy N. A. Kuznetsov

ICS RAS, Russia RUDN University, Russia Program Systems Institute of RAS, Russia Tampere University, Finland Riga Technical University, Latvia McMaster University, Canada Moscow Institute of Physics and Technology, Russia Kettering University, USA Institute of Computer Science of the Polish Academy of Sciences, Poland National Changhua University of Education, Taiwan, ROC Belarusian State University, Belarus Moscow Institute of Physics and Technology, Russia RUDN University, Russia Silesian University of Technology, Poland University of York, UK Kotelnikov Institute of Radioengineering and Electronics of RAS, Russia Brno University of Technology, Czech Republic CMS College, India Aristotle University of Thessaloniki, Greece University of São Paulo, Brazil NASK, Poland Johannes Kepler University Linz, Austria Bonch-Bruevich Saint-Petersburg State University of Telecommunications, Russia Tampere University, Finland Aalborg University, Denmark University of Bamberg, Germany Cochin University of Science and Technology, India Moscow Institute of Physics and Technology, Russia

viii

Organization

L. Lakatos E. Levner S. D. Margenov

N. Markovich A. Melikov G. K. Miscoi E. V. Morozov V. A. Naumov A. A. Nazarov I. V. Nikiforov P. Nikitin S. A. Nikitov D. A. Novikov M. Pagano E. Petersons V. V. Rykov L. A. Sevastianov M. A. Sneps-Sneppe P. Stanchev S. N. Stepanov S. P. Suschenko J. Sztrik H. Tijms S. N. Vasiliev M. Xie A. Zaslavsky Yu. P. Zaychenko

Budapest University of Technology and Economics, Hungary Holon Institute of Technology, Israel Institute of Information and Communication Technologies of Bulgarian Academy of Sciences, Bulgaria ICS RAS, Russia Institute of Cybernetics of the Azerbaijan National Academy of Sciences, Azerbaijan Academy of Sciences of Moldova, Moldova Institute of Applied Mathematical Research of the Karelian Research Centre RAS, Russia Service Innovation Research Institute (PIKE), Finland Tomsk State University, Russia Université de Technologie de Troyes, France University of Washington, USA Institute of Radioengineering and Electronics of RAS, Russia ICS RAS, Russia University of Pisa, Italy Riga Technical University, Latvia Gubkin Russian State University of Oil and Gas, Russia RUDN University, Russia Ventspils University College, Latvia Kettering University, USA Moscow Technical University of Communication and Informatics, Russia Tomsk State University, Russia University of Debrecen, Hungary Vrije Universiteit Amsterdam, The Netherlands ICS RAS, Russia City University of Hong Kong, Hong Kong, SAR, China Deakin University, Australia Kyiv Polytechnic Institute, Ukraine

Organizing Committee V. M. Vishnevskiy (Chair) K. E. Samouylov (Vice Chair) D. V. Kozyrev A. A. Larionov S. N. Kupriyakhina S. P. Moiseeva

ICS RAS, Russia RUDN University, Russia ICS RAS and RUDN University, Russia ICS RAS, Russia ICS RAS, Russia Tomsk State University, Russia

Organization

T. Atanasova I. A. Kochetkova

ix

IIICT BAS, Bulgaria RUDN University, Russia

Organizers and Partners Organizers Russian Academy of Sciences RUDN University V.A. Trapeznikov Institute of Control Sciences of RAS National Research Tomsk State University Institute of Information and Communication Technologies of the Bulgarian Academy of Sciences Research and Development Company “Information and Networking Technologies” Support Information support was provided by the Russian Academy of Sciences. The conference was organized with the support of the “RUDN University Program 5-100.”

Contents

Computer and Communication Networks Challenges and Performance Evaluation of Multicast Transmission in 60 GHz mmWave . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Nadezhda Chukhno, Olga Chukhno, Giuseppe Araniti, Antonio Iera, Antonella Molinaro, and Sara Pizzi Deep Learning for IoT Traffic Prediction Based on Edge Computing. . . . . . . Ali R. Abdellah, Volkov Artem, Ammar Muthanna, Denis Gallyamov, and Andrey Koucheryavy On Optimal Placement of Base Stations in Wireless Broadband Networks to Control a Linear Section with End-to-End Delay Limited . . . . . . . . . . . . . Amir Mukhtarov, Oleg Pershin, Andrey Larionov, and V. M. Vishnevsky CPU vs GPU Performance of MATLAB Clustering Algorithms . . . . . . . . . . Andrey Ivanov, Ziazina Natalia, and Antonova Veronika High-Capacity Photon Switching Systems Based on the Two-Stage 256  256 Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . E. A. Barabanova, K. A. Vytovtov, V. S. Podlazov, and V. M. Vishnevsky

3

18

30 43

57

Investigation of the Guaranteed Traffic Rate in Enterprise WLAN. . . . . . . . . M. Rudenkova, H. Khayou, and L. I. Abrosimov

70

SARSA Based Method for WSN Transmission Power Management . . . . . . . Alexander Alexandrov and Vladimir Monov

82

Method of Frequency Coding in Microwave RFID . . . . . . . . . . . . . . . . . . . Sergey Suchkov, Viktor Nikolaevtsev, and Dmitry Suchkov

94

On Synchronisation of ISS-OFDM Signals . . . . . . . . . . . . . . . . . . . . . . . . . Semyon Dorokhin

105

Reserve Navigation System of Tether Powered Unmanned Aerial Platform in Conditions of Turbulent Atmosphere . . . . . . . . . . . . . . . . . . . . . . . . . . . V. M. Vishnevsky, E. A. Mikhailov, and Nguyen Duy Phuong

117

Teleportation of the Bell States on IBM Q Computers Under Their Hardware Errors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . V. P. Gerdt and E. A. Kotkova

129

xii

Contents

Management of Risks for Complex Computer Network . . . . . . . . . . . . . . . . A. O. Kalashnikov and E. V. Anikina Prerequisites and Methodology for Digital Transformation of 4G Networks into 5G Ecosystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . V. L. Shirokov

144

158

Analytical Modeling of Distributed Systems The Simulation of Finite-Source Retrial Queueing Systems with Two-Way Communications to the Orbit and Blocking . . . . . . . . . . . . . . . . . . . . . . . . János Sztrik, Ádám Tóth, Ákos Pintér, and Zoltán Bács

171

Token Based Parallel Processing Retrial Queueing System with a Probabilistic Joining Strategy for Priority Customers . . . . . . . . . . . . . Dhanya Babu, V. C. Joshua, and A. Krishnamoorthy

183

A Disease Outbreak Managing Queueing System with Self-generation of Status and Random Clock for Quarantine Time. . . . . . . . . . . . . . . . . . . . T. S. Sinu Lal, V. C. Joshua, and A. Krishnamoorthy

195

Stochastic Optimization of Local Purchase Quantities in a Geo/Geo/1 Production Inventory System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . K. P. Jose and M. P. Anilkumar

206

Mathematical Model of Horizontal VNF Scalability in virtualized Evolved Packet Core . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Alexey Tsarev and Pavel Abaev

221

The Method for User Localization in the Local Wireless Network in an Emergency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A. I. Paramonov, T. M. Tatarnikova, and R. V. Shamilova

235

Analysis of the Using of D2D Communications for the Ad Hoc Network Based on Subscriber Terminals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A. Paramonov, T. Tatarnikova, and A. Marochkina

247

Channel Switching Threshold Strategies for Multichannel Controllable Queuing Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A. S. Mandel and V. A. Laptin

259

Modeling and Simulation of Reliability Function of a k-out-of-n:F System . . . Nika Ivanova Two Ways of Group Polling Method Application for Sensors Detecting in Unsynchronized Structured WSNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ivan Tsitovich

271

286

Contents

Regeneration Analysis of Non-Markovian System with Simultaneous Service and Speed Scaling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ruslana Nekrasova Integrated Tolerant Distributed Computing Network . . . . . . . . . . . . . . . . . . Oleg Brekhov

xiii

299 311

Asymptotic Analysis of RQ-System with Feedback and Batch Poisson Arrival Under the Condition of Increasing Average Waiting Time in Orbit. . . A. A. Nazarov, S. V. Rozhkova, and E. Yu. Titarenko

327

On Comparison of Multiserver Systems with Two-Component Mixture Distributions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Irina Peshkova, Evsey Morozov, and Maria Maltseva

340

On Splitting Scenarios for Effective Simulation of Reliability Models . . . . . . Alexandra Borodina and Vitaliy Tishenko Ergodicity and Polynomial Convergence Rate of Generalized Markov Modulated Poisson Processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Galina Zverkina The Mathematical Model for Calculating Physical Entity of DPI Analyser . . . Boris Goldstein and Vadim Fitsov The Overflow Probability Asymptotics in a Multiclass Single-Server Retrial System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Evsey Morozov and Ksenia Zhukova Wireless Channel Modeling and Simulation with K Distribution . . . . . . . . . . S. G. Shorokhov Melanoma Detection Computer System Development with Deep Neural Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Eugene Yu. Shchetinin, Leonid A. Sevastianov, Dmitry S. Kulyabov, Edik A. Ayryan, and Anastasia V. Demidova

353

367 382

394 407

422

Distributed Systems Applications Comparison of Different Smoothing Methods for Initial Data of the DSN-PC Sensor Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ádám Vas and László Tóth NFC Vulnerabilities Investigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . S. Japertas and R. Jankūnienė

437 450

xiv

Contents

Data Migration Rate of CRUSH-Based Distributed Object Storage with Dynamic Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Alexey Vanin, Vladimir Bogatyrev, and Stanislav Bogatyrev

464

Reduction of the Energy Consumption on Preliminary Signal Processing in Vibration Monitoring Networks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Vitaly Morozov and Konstantin Alikin

472

Stability and Sustainability of Cryptotokens in the Digital Economy . . . . . . . N. V. Apatova, O. V. Boychenko, O. L. Korolyov, I. V. Gavrikov, and T. K. Uzakov

484

Identification System Model for Energy-Efficient Long Range Mesh Network Based on Digital Object Architecture . . . . . . . . . . . . . . . . . . . . . . Dmitriy Sazonov and Ruslan Kirichek

497

Efficient Wireless Data Collection System Based on LoRaWAN Technology and Distributed Computation Approach . . . . . . . . . . . . . . . . . . Yury Rassadin and Sergey Dushin

510

Computing Load Distribution by Using Peer-to-Peer Network . . . . . . . . . . . Anton Mamonov, Ruslan Varlamov, and Soltan Salpagarov

521

Firewall Simulation Model with Filtering Rules Ranking . . . . . . . . . . . . . . . Anatoly Botvinko and Konstantin Samouylov

533

Performance of Forward Error Correction in Transport Protocol at Intrasegment Level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . P. V. Pristupa, P. A. Mikheev, and S. P. Suschenko

546

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

557

Computer and Communication Networks

Challenges and Performance Evaluation of Multicast Transmission in 60 GHz mmWave Nadezhda Chukhno1,2(B) , Olga Chukhno1,3 , Giuseppe Araniti1 , Antonio Iera4 , Antonella Molinaro1,5 , and Sara Pizzi1 1

University Mediterranea of Reggio Calabria, Reggio Calabria, Italy {nadezda.chukhno,olga.chukhno,araniti,antonella.molinaro, sara.pizzi}@unirc.it 2 Universitat Jaume I, Castell´ o de la Plana, Spain 3 Tampere University, Tampere, Finland 4 University of Calabria, Rende, Italy [email protected] 5 Universit´e Paris-Saclay, Gif-sur-Yvette, France

Abstract. Recently, millimeter-wave (mmWave) technology has attracted significant attention due to its ambitious promise to deal with the rapid growth in wireless data traffic. Moreover, mmWave is expected to constitute a foundation for the fifth-generation (5G) communication systems’ services, claimed to efficiently and effectively support both unicast and multicast transmission modes. However, the use of highly directional antennas at both user and access point sides is required to compensate for the severe path loss, high attenuation, and atmospheric absorption at extremely high-frequency bands, e.g., mmWave. Hence, multicast transmission needs special attention in directional systems due to the nature of group-oriented services, wherein a single beam simultaneously feeds receivers located at different positions. Since the widest possible beams at 60 GHz band are limited in terms of range and data rate and cannot serve all users, and, inversely, the use of only fine beams steered toward each user in unicast fashion requires long data transmission duration, the design of efficient directional multicast schemes is of utmost importance. Further, a slight beam misalignment due to mobility can generate a significant signal drop even between devices communicating in unicast fashions. The mission of this paper is to discuss the main challenges that must be faced to take advantage of mmWave communication for multicast data delivery. To this end, we investigate the performance of such systems in terms of data rate and data transmission duration via simulations considering both static and dynamic scenarios.

Keywords: 5G

· mmWave · 802.11ad/ay · Unicast · Multicast

c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 3–17, 2020. https://doi.org/10.1007/978-3-030-66242-4_1

4

1

N. Chukhno et al.

Introduction

Millimeter wave (mmWave) communications are considered promising candidates for future wireless networks to meet the ever-increasing demands for highdata-rate multimedia access and spectrum requirement of fifth-generation (5G) mobile communication systems [1]. Furthermore, according to both academic and industrial communities, mmWave technology is expected to play a fundamental role even in beyond-5G (B5G) networks to ensure efficient massive data transmissions [2]. For example, the 3GPP New Radio (NR) technology will exploit the mmWave spectrum to achieve increased bandwidths and higher data rates [3]. IEEE 802.11ad/ay specifications use a similar approach and claim to achieve up to 100 Gbps rate communication [4]. Therefore, the envisioned performance of mmWave systems is ideal for satisfying the typical demands of the bandwidth-hungry 5G and B5G services and emerging applications, which mainly require disseminating a large amount of data traffic with low latency, e.g., autonomous driving, mobile video streaming, virtual/augmented/mixed reality (VR/AR/XR) applications, public/road safety, road infotainment, among others. Moreover, the throughput gain enhancement is an essential target in mmWave communication development. Meanwhile, a beneficial technique for the system bandwidth efficiency improvement is multicast communication, wherein the same packet is delivered from a transmitter to an arbitrary number of receivers simultaneously by utilizing the same frequency and modulation and coding scheme (MCS). However, to compensate for the high path loss at extremely high frequency (EHF) bands and guarantee the gigabit capabilities, highly directional antennas are required for mmWave transmissions where the signal is sensitive to rapid channel variations, atmospheric absorption, and severe attenuation. This requirement makes multicasting more complex to implement compared to microwave networks where omnidirectional antennas are typically used. The beam steering, the size of multicast subgroups, and the beamwidth to cover all users have to be properly selected. Further, the presence of mobile users poses an additional challenge to mmWave wireless systems with directional group-oriented transmissions. To this end, the paper dedicates to discuss and analyze the challenging issues and advantages of mmWave multicast communication with a particular focus on WiGig/IEEE 802.11 specifications. The paper is organized as follows. The description of IEEE 802.11ad/ay standards is given in Sect. 2. The design challenges of multicast and unicast modes with directional mmWave transmissions are discussed in Sect. 3. Section 4 describes the system model under analysis. Simulation results are discussed in Sect. 5. The conclusions of our study are given in the last section.

2

IEEE 802.11ad/ay Specifications

The WiFi/WiGig standards (i.e., IEEE 802.11ad/ay) support wireless networking at 60 GHz. The IEEE 802.11ad standard, ratified in 2012, offers real

Challenges and Performance Evaluation of Multicast Transmission

5

multi-gigabit data rates. Its successor, IEEE 802.11ay, excels the capabilities of 802.11.ad by exploiting the same band and provides ultra-high-speed and superlow-latency services by introducing advanced physical layer (PHY) features. The second WiGig standard quadruples the bandwidth, adds MIMO up to 8 spatial streams, channel bonding, channel aggregation, and ensures non-uniform modulation constellation [5]. Besides, 802.11ay advanced power-saving feature makes it ideal for wearable devices. For instance, these kinds of requirements may be suitable for AR/VR applications [6]. 2.1

IEEE 802.11ad

In this section, a more in-depth investigation and analysis of the beacon interval structure in IEEE 802.11ad (see Fig. 1) is conducted. The medium access control (MAC) design for 802.11ad may utilize both carrier sensing multiple access with collision avoidance (CSMA/CA) and scheduled service periods (SPs) channel access schemes depending on the type of application. In the case of SPs, 802.11ad uses time division multiple access (TDMA), where a personal basic service set (PBSS) central point (PCP) or access point (AP) utilizes the polling mechanism by asking devices and receiving their feedback. Alternatively, CSMA/CA is used for contention-based periods (CBP), where devices are allowed to use the same radio channel without pre-coordination with the help of listen-before-talk operating procedure. In this work, we consider SPs only. Beacon interval (BI) BHI DTI BT

A-BFT AT

CBP1 SP1

Beacon interval (BI) BHI ...

SPn

BT

A-BFT

DTI SP

AT

SP1

BRP ...

...

SP2 ... SPn

a. Unicast

b. Multicast

Fig. 1. IEEE 802.11.ad beacon structure.

The time is divided into beacon intervals (BIs) of total length T ; each BI incorporates: (i) a beacon header interval (BHI), where devices perform initial beamforming, which generally involves sectored antennas (aka sector-level sweep, SLS), and adjust their wider transmit beams, and (ii) a data transmission interval (DTI), including SPs of different connected clients, while containing a beam refinement protocol (BRP) to improve the resulting instantaneous data rate. More specifically, on the MAC layer each BI starts with a beacon time (BT) interval during which the initiator transmits sector sweep (I-TXSS) beacons across all MSLS sectors with half-power beamwidth (HPBW) of θSLS,Tx =

6

N. Chukhno et al.

2π/MSLS . The receive sector sweep (RSS) process and feedback during the association beamforming training (A-BFT) announced by the initiator are performed after I-TXSS by the receiver. Practically, in A-BFT interval, if more than one client selects the same transmission opportunity (up to eight slots for 802.11ad), the signals collide, and devices cannot establish a connection in the current BI. The receive antenna operates in an omnidirectional mode during SLS and, after measuring the receive signal strength (RSS) across all NSLS sectors, with θSLS,Rx = 2π/NSLS , it provides the SLS feedback to the transmitter identifying the sector with maximum RSS value. Based on the RSS indicator as well as by using an angle of arrival (AoA) or time difference of arrival (TDoA), the AP can determine the user location information. The training packets are transmitted with the low-power low-rate MCS 0, which provides the reliable communication required to establish the initial beamformed link. In the announcement time interval (ATI), management information is exchanged between the PCP/AP and the receivers. Once the best sector pair is identified, the beam refinement phase (BRP) iteratively trains the transmit and receive antenna beams found during the SLS to select a beam pattern pair with finer beamwidths determined by the beam refinement factor b, b > 1. Therefore, for the transmit antenna training, both devices sweep through exactly b narrower beams (within the initial transmit sector), while during the receive training, all M = bMSLS or N = bNSLS directions should be covered. We remark that the SLS and BRP phases of beamforming usually precede data transmission. They are always executed at the beginning of the beamforming process. However, the DTI can be used for all the beamforming phases to enable the repetition of the beamforming process as and when required. The optional beam tracking phase is used during data transmission (DT) to adjust for channel changes. Beam tracking is accomplished by appending training (TRN) fields to data packets [7]. The basic principle of 802.11.ad BI is briefly reviewed in this section, interested readers for more details can refer to [8], and the detailed description of the protocol may be found in [9]. 2.2

IEEE 802.11ay

IEEE 802.11ay is an amendment of great interest for applications ranging from high-speed short-range links to wireless backhaul that enable 100 Gbps communications in the 60 GHz mmWave band. IEEE 802.11ay incorporates a variety of technical advancements at the PHY over IEEE 802.11ad standard, such as channel bonding and aggregation, single-user (SU) and downlink (DL) multiuser (MU) Multiple-Input Multiple-Output (MIMO) transmissions, and nonuniform modulation constellation, as well as improved channel access and enhanced beamforming training. In 802.11ay, the enhanced directional multi-gigabit (EDMG) PCP/AP can allocate multiple clients on different channels to communicate with the PCP/AP simultaneously. Moreover, two EDMG clients can communicate with each other

Challenges and Performance Evaluation of Multicast Transmission

7

on a bonded channel or an aggregated channel to achieve higher throughput and improve channel utilization. A new packet structure is defined in IEEE 802.11ay to support MIMO wireless links and channel bonding. The EDMG packet contains new fields necessary to support the additional capabilities defined for EDMG stations and a redefined TRN field that is more flexible and efficient than the one specified in 802.11ad. In this section, we summarized the main improvements of the IEEE 802.11ay standard. The detailed overview of the IEEE 802.11ay can be found in [4,5].

3 3.1

Design Challenges of mmWave Multicast and Unicast Modes Unicast in Directional Networks

A considerable amount of research recently investigated mmWave communications by focusing on unicast data transmission optimization [10,11], where the AP performs serial TDMA transmissions. In mmWave wireless personal area networks (WPAN), each user is served independently of the others with minimum beamwidth (on the order of 10–20◦ or less) to provide high data rates. The reliability of such transmissions is very high since the beamwidth is equal to the resolution and provides the maximum available signal-to-noise ratio (SNR). However, the AP requires a long time to serve all users, as it generates a separate beam for each user to transmit the data sequentially. 3.2

Multicast in Traditional Networks

Multicast is a bandwidth-conserving technology, the basic concept of thereof consists in the traffic reduction by simultaneous delivering a single stream of information to a group of users, i.e., data packets are transmitted only once. Consequently, it considerably improves the bandwidth efficiency compared to unicast mode since all users are served simultaneously by using a single wide transmission beam (omnidirectional), which generally provides very short transmission duration. In the past literature, several efficient solutions improving traditional multicast schemes in omnidirectional networks were proposed [12–14]. However, pure multicast schemes are almost infeasible in mmWave directional systems due to the propagation specifics at EHF bands. The adaptation of the directional nature of mmWave communication for existing methods, as well as the development of novel mmWave-specific schemes [15,16], is of particular interest for the research community. 3.3

Multicast in Directional Networks

The use of highly directional transmission beams in mmWave systems represents an outstanding feature with respect to traditional networks and allows coping with high attenuation at EHF bands. Most phased array antennas that have been

8

N. Chukhno et al.

designed in past years have used analog beamforming where the phase adjustment is performed at RF, and there is one set of data converters for the entire antenna (one RF chain). Note that analog mmWave systems utilize sequential multicast. The beam orientation and the beam resolution (beamwidth), which need to be adjusted in addition to the beam radius, make these systems different from conventional omnidirectional networks. By contrast, in the case of hybrid or digital beamforming techniques, which allow transmitting to more than one user at a time, the power budget constraint at the transmitter side has to be taken into consideration [17]. Therefore, when multiple RF chains are available, new opportunities and challenges (e.g., determining the shape of numerous beams to be swept simultaneously under the total transmission power constraint) appear. In alignment with the Friis transmission equation, the received power is directly proportional to the transmitter channel gain, which, in its turn, strongly depends on the beam orientation and resolution. Then, multicast traffic delivery in mmWave systems presents the following problems, which have to be considered [17]: 1. Wide beams are more likely to reach all multicast receivers since they can cover a larger angle range and, thus, serve more users simultaneously. However, due to the lower antenna gain that wide beams provide, the supported transmission rate is limited. 2. Narrow beams provide higher antenna gain and thus can support higher transmission rates. However, they are limited in coverage in terms of the aperture angle and may not simultaneously serve a number of users. As a consequence, multiple unicast transmissions are required to reach all multicast users. 3. The presence of moving users is more challenging for multicast transmission. In fact, in the case of unicast, the AP is beamformed toward the only receiver, and small movements of the receiver still allow to guarantee a good reception. Differently, in the case of multicast, beams are steered in between users. Hence, some receivers may be close to the edge of a beam’s coverage area and, due to the even small mobility, can be out of the beam coverage. The integrated problem of directional beamforming and multicast communications is under investigation in this paper.

4

System Model

In this paper, we consider a general public scenario where owners of wearable devices are interested in receiving the same content, i.e., the AP transmits data to multiple users thought multicast mmWave links. We assume analog beamforming only to analyze the performance of sequential multicast in TDMA fashion. This means that the AP can transmit through a single beam at a time to serve the users.

Challenges and Performance Evaluation of Multicast Transmission

4.1

9

Antenna and Channel Models

In what follows, we assume that devices transmit directionally with the same antenna beam pattern, which is symmetrical w.r.t. the boresight [18]. By this symmetrical assumption, we mean that antennas have a unique beam shape in both elevation and azimuth planes, i.e., their antenna pattern is akin to a conical shape. In terms of the channel model, when HPBW θ is used, the received signal power at receiver i is calculated by the Friis equation: Prx,i =

Ptx D0 ρ(αi )λ2 , (4π)2 riκ

(1)

where Ptx is the transmit power, αi is the current angular deviation of the transmit/receive direction from the antenna boresight for receiver i, ρ(αi ) ∈ [0; 1] is a piece-wise linear function that scales the antenna directivity D0 [18]1 , λ is the wavelength, ri is the separation distance between the transmitter (Tx) and receiver (Rx) i, and κ is the path loss exponent. We assume the line of sight (LoS) path only. Hence, the maximum achievable rate Di of the Tx-Rxi link could be estimated according to Shannon’s channel capacity as:   Prx,i Di = W log2 1 + , (2) Pnoise where Prx incorporates both transmit and receive antenna gains after the BRP phase, W is the bandwidth, Pnoise is noise power in the channel, which corresponds to (3) Pnoise = W N0 NF, where N0 is the power spectral density of noise per 1 Hz, and NF is the noise figure. For a multicast group containing n receivers, the overall performance of multicast transmission depends on the user with the worst channel. Thus, the achievable rate of a multicast transmission is given by    Prx,i , 0|Prx,i < Pthr , (4) D = W log2 1 + min i Pnoise where Pthr guarantees the minimum required received power for data transmission. The data transmission duration for multicast transmission is given by TDT = 1

B , D

(5)

ρ(αi ) = 1 − αθi , if αi ≤ θ, otherwise ρ(αi ) = 0; ρ(αi ) = 1 corresponds to the antenna boresight in the case of perfect alignment (e.g., unicast transmission after the beamforming procedure). In the case of multicast transmission, each user deviates on angle α from the boresight of the transmitter.

10

N. Chukhno et al.

where B is the packet size. Then, the total duration of data transmission can be calculated as T = TSLS + U (TBRP + TDT ) + T0 ,

(6)

where TSLS + U (TBRP ) is the overhead on the beam training, U is the average number of clients per AP, and T0 is the total signaling overhead, which is independent of the number of beams.

5

Performance Analysis

In this section, we evaluate the multicast transmission performance in directional mmWave networks via simulations. To this end, we focus on a scenario composed of a group of people in a museum interested in receiving the same multimedia content by means of high-end wearable devices equipped with IEEE 802.11ad/ay chipsets operating at 60 GHz. We consider an analog beamforming technique (one RF chain), which means that the AP can transmit over a single beam at a time, to assess the performance of sequential multicast. For the evaluation purpose, we consider resource-hungry applications in scenarios with and without mobility. We also analyze two patterns of users’ distribution: (i) within a sector (see Sect. 5.1) to investigate sequential multicast performance characteristics, and (ii) in a line (see Sects. 5.2 and 5.3) to explore the angle coverage of the antenna. The transmit power is fixed at the level of Ptx = 23 dBm, whereas Pthr = −68 dBm (MCS 1) [9]. Main simulation parameters are summarized in Table 1. Table 1. Main simulation parameters Notation Parameter

Value

f

Carrier frequency

60 GHz

λ

Wavelength

0.005 m

k

Propagation exponent

2

C

Propagation constant

6.3165 · 106

Pthr

Sensitivity

−68 dBm [9]

Ptx

Transmit power

23 dBm

θ

Beamwidth

var

Rd

Radius of the area of interest

40 m

SNRmax

SNR corresponding to choosing MCS19 (rate 13/16) 20 dB

NF

Noise figure

6 dB

B

Packet size

1 Gb

Challenges and Performance Evaluation of Multicast Transmission

5.1

11

Static Scenario: Unicast vs. Multicast Performance

To simulate sequential multicasting, we assume that the AP sweeps beams of equal resolution (i.e., fixed predefined beams) to cover the sector under analysis, as illustrated in Fig. 2.

R 2 seq. beams

R R 3 seq. beams 4 seq. beams

Fig. 2. Illustration of the multicast scheme with fixed beams.

We first analyze the system performance in terms of aggregated data rate (ADR) for sequential multicast and unicast schemes (see Fig. 3). For this purpose, we uniformly distribute users within a sector of 90◦ of radius Rd = 40 m. The choice of the service area radius can be explained by the fact that sequential multicast with the widest width (i.e., θ = 58◦ ) requires the lowest number of sequential beams, whereas it can cover the smallest Rd in comparison with narrower beams. More precisely, for given system parameters, the beam of 58◦ can cover only a distance of 45 m. However, due to the beam misalignment in multicast, we set Rd to 40 m to guarantee reliable communications for every considered transmission scheme. We recall that the wider HPBW of the predefined beams, the less number of beams needs to be swept by the AP to cover the considered sector (in terms of the angle coverage). One may deduce that the wides beams, e.g., HPBW = 58◦ , can improve the system throughput. The effects of sequential transmissions on the total delay in mmWave systems are further highlighted in Fig. 4. As one may observe, sequential multicast with θ = 58◦ guarantees the shortest data transmission duration; hence, the lower total transmission delay. However, it provides lower SNR value as well as higher outage probability due to the lower antenna directionality. Using the widest possible beam at EHF bands severely limits the data rate and transmission range. In contrast, narrow beams require a longer data transmission duration. Therefore, we may conclude that the resource management algorithms are of crucial

N. Chukhno et al.

55

Packet Size=1 Gb Seq. Multicast: HPBW = 18° Seq. Multicast: HPBW = 32° Seq. Multicast: HPBW = 58° Unicast: HPBW = 4°

50 45

ADR, Gbps

40 35 30 25 20 15

HPBW = 18°,32°,58°

10 5

2

4

6

8

10

12

14

16

18

20

Number of users

Fig. 3. Aggregated data rate vs. number of users.

2.2

Packet Size=1 Gb Seq. Multicast: HPBW = 18° Seq. Multicast: HPBW = 32° Seq. Multicast: HPBW = 58° Unicast: HPBW = 4°

2 1.8 1.6

Total delay, s

12

1.4 1.2 1

HPBW = 18°,32°,58°

0.8 0.6 0.4 0.2 0

2

4

6

8

10

12

14

16

18

Number of users

Fig. 4. Total transmission duration vs. number of users.

20

Challenges and Performance Evaluation of Multicast Transmission

13

importance since they allow to dynamically make decisions based on the number and resolution of beams in directional multicast by taking into consideration (i) the multicast group size, (ii) the shape and size of the service area, (iii) users’ locations and density, as well as (iv) QoS requirements. In addition, in the case of hybrid beamforming, power models have to be applied to split the power among composite multi beam patterns. 5.2

Static Scenario: Coverage Area Estimation

In this section, we show results in terms of achievable data rate and total transmission delay for multicast, unicast, and sequential multicast schemes when a group of ten users is located within a line of length d. Here, in the case of sequential multicast, we assume that the group of users is always served by a fixed number of beams N = 3, independently from the beam resolution. We investigate the maximum possible distance d at which the connection can be established, for the three considered schemes. 8

Achievable data rate, Gbps

HPBW = 18° 7.5

7

HPBW = 32°

6.5

HPBW = 58° 6

5.5 100

Unicast Multicast Seq. Multicast 101 Distance d, m

Fig. 5. Data rate vs. distance d for unicast, multicast, and sequential multicast.

By analyzing the results presented in Fig. 5, we learn that the distance d does not affect unicast transmission as a separate aligned beam is swept to serve each user. Regarding the pure multicast scheme, we can see that there is a threshold that determines the maximum coverage angle of the beam. For example, HPBW = 58◦ provides the larger distance d, whereas the narrowest beam (i.e., HPBW = 18◦ ) covers the lowest distance d. We also highlight that sequential multicast

14

N. Chukhno et al.

achieves higher data rates for the same distance d compared to the multicast scheme. It can be explained by the fact that multicast (with a single beam only) experiences difficulties or even fails to provide sufficient data rates to users located far apart in terms of the angle coverage. 1.4 1.2

Unicast

Total delay, s

1 0.8 0.6

HPBW = 18°,8°,4°,32°,58°

HPBW = 18°,8°,32°,4°,58° Seq. Multicast

0.4 0.2 0 100

Multicast HPBW = 18°,8°,32°,58°,4° 101 Distance d, m

Fig. 6. Total transmission delay vs. distance d for unicast, multicast, and sequential multicast.

Achievable multicast, sequential multicast, and unicast bit rates as functions of distance d are depicted in Fig. 6 for different HPBWs. Due to the sequential nature of unicast in mmWave, pure multicast guarantees the shortest data transmission duration. Meanwhile, both sequential schemes ensure higher distance d with respect to multicast transmission, which means that more users can receive data. We also emphasize that the beamforming overhead for narrow beams is greater than for wide beams and affects the total transmission delay (see, for instance, the curves related to HPBW = 4, 8◦ for three transmission fashions). 5.3

Dynamic Scenario: Mobility Impact on Multicast Transmission

To facilitate a more detailed performance evaluation, we proceed by considering the scenario with mobile users. The mobility influence on the three transmission modes is evaluated in Fig. 7. We assume a simple case with two devices located in a line of size d = 16 m for θ = 8◦ . We analyze the behavior of unicast and multicast transmissions in the presence of mobile users by considering a rectilinear mobility pattern with user speeds of v = 0.5 m/s (as per walking or rolling stairs), v = 11 m/s (as per

Normalized average bit rate, Gbps

Challenges and Performance Evaluation of Multicast Transmission 7.5

15

Unicast, v = 0.5m/s

7

Multicast, v = 0.5m/s Unicast, v = 12m/s

6.5 6 5.5

Multicast, v = 12m/s Multicast, v = 22m/s

Unicast, v = 22m/s

5 4.5 0.05

0.1

0.15

0.2

0.25

0.3

T, s

Fig. 7. Normalized average achievable data rate over time T for different speeds, θ = 8◦ .

segway), and v = 22 m/s (as per bicycle). We also consider the overhead on beam training and recalculate the data rate over the total BI duration, i.e., Dnorm = D · TDT /T . As one may notice from Fig. 7, the multicast transmission is more vulnerable to dynamic users’ behaviors due to the fact that the beam is steered in between users, and some of them may be located at the edge of the beam. Hence, mobility management in directional multicast systems is even more challenging compared to unicast transmissions.

6

Conclusion

This paper presented an initial investigation of multicast transmissions using mmWave links with particular emphasis on the channel access of 802.11ad/ay standards operating at the unlicensed band. We experimentally evaluate multicast and unicast performance in directional mmWave networks. From the numerical evaluation of the model, it is clear that multicast in directional networks poses additional challenges compared to conventional systems. Since using the widest possible omnidirectional beam at EHF bands severely limits the data rate and range, the AP needs to transmit data sequentially by utilizing a resource management algorithm, which is our future research task. In addition, scenarios with the presence of mobile users receiving group-oriented services in directional mmWave networks is an essential issue to be faced by the research community. Acknowledgement. The authors gratefully acknowledge funding from European Union’s Horizon 2020 Research and Innovation programme under the Marie Sklodowska Curie grant agreement No. 813278 (A-WEAR: A network for dynamic wearable applications with privacy constraints, http://www.a-wear.eu/).

16

N. Chukhno et al.

References 1. Lu, X., et al.: Integrated use of licensed-and unlicensed-band mmWave radio technology in 5G and beyond. IEEE Access 7, 24376–24391 (2019) 2. Lu, X., Petrov, V., Moltchanov, D., Andreev, S., Mahmoodi, T., Dohler, M.: 5GU: conceptualizing integrated utilization of licensed and unlicensed spectrum for future IoT. IEEE Commun. Mag. 57(7), 92–98 (2019) 3. Ahmadi, S.: 5G NR: Architecture, Technology, Implementation, and Operation of 3GPP New Radio Standards. Academic Press, Cambridge (2019) 4. Ghasempour, Y., da Silva, C.R., Cordeiro, C., Knightly, E.W.: IEEE 802.11ay: next-generation 60 GHz communication for 100 Gb/s Wi-Fi. IEEE Commun. Mag. 55(12), 186–192 (2017) 5. IEEE 802.11 Working Group: Enhancements for very high throughput for operation in license-exempt bands above 45 GHz. Technical report, IEEE P802.11ay/D3.0 (2019) 6. da Silva, C.R., Lomayev, A., Chen, C., Cordeiro, C.: Analysis and simulation of the IEEE 802.11ay single-carrier PHY. In: 2018 IEEE International Conference on Communications (ICC), pp. 1–6. IEEE (2018) 7. Kutty, S., Sen, D.: Beamforming for millimeter wave communications: an inclusive survey. IEEE Commun. Surv. Tutor. 18(2), 949–973 (2015) 8. Chukhno, N., Chukhno, O., Shorgin, S., Samouylov, K., Galinina, O., Gaidamaka, Y.: Maximizing achievable data rate in unlicensed mmWave networks with mobile clients. In: Galinina, O., Andreev, S., Balandin, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART 2019. LNCS, vol. 11660, pp. 282–294. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-30859-9 24 9. IEEE 802.11 Working Group: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. Amendment 3: Enhancements for Very High Throughput in the 60 GHz Band (2012) 10. Al-samman, A.M., Azmi, M.H., Rahman, T.A.: A survey of millimeter wave (mmWave) communications for 5G: channel measurement below and above 6 GHz. In: Saeed, F., Gazem, N., Mohammed, F., Busalim, A. (eds.) IRICT 2018. AISC, vol. 843, pp. 451–463. Springer, Cham (2018) 11. Sanfilippo, G., Galinina, O., Andreev, S., Pizzi, S., Araniti, G.: A concise review of 5G new radio capabilities for directional access at mmWave frequencies. In: Galinina, O., Andreev, S., Balandin, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART 2018. LNCS, vol. 11118, pp. 340–354. Springer, Cham (2018). https://doi.org/10. 1007/978-3-030-01168-0 32 12. Rinaldi, F., Pizzi, S., Orsino, A., Iera, A., Molinaro, A., Araniti, G.: A novel approach for MBSFN area formation aided by D2D communications for eMBB service delivery in 5G NR systems. IEEE Trans. Veh. Technol. 69(2), 2058–2070 (2019) 13. Araniti, G., Rinaldi, F., Scopelliti, P., Molinaro, A., Iera, A.: A dynamic MBSFN area formation algorithm for multicast service delivery in 5G NR networks. IEEE Trans. Wirel. Commun. 19(2), 808–821 (2019) 14. Pizzi, S., Suraci, C., Iera, A., Molinaro, A., Araniti, G.: A sidelink-aided approach for secure multicast service delivery: from human-oriented multimedia traffic to machine type communications. IEEE Trans. Broadcast. PP, 1–11 (2020) 15. Naribole, S., Knightly, E.: Scalable multicast in highly-directional 60-GHz WLANs. IEEE/ACM Trans. Network. 25(5), 2844–2857 (2017) 16. Niu, Y., Yu, L., Li, Y., Zhong, Z., Ai, B.: Device-to-device communications enabled multicast scheduling for mmWave small cells using multi-level codebooks. IEEE Trans. Veh. Technol. 68(3), 2724–2738 (2018)

Challenges and Performance Evaluation of Multicast Transmission

17

17. Biason, A., Zorzi, M.: Multicast via point to multipoint transmissions in directional 5G mmWave communications. IEEE Commun. Mag. 57(2), 88–94 (2019) 18. Chukhno, O., Chukhno, N., Galinina, O., Gaidamaka, Y., Andreev, S., Samouylov, K.: Analysis of 3D deafness effects in highly directional mmWave communications. In: 2019 IEEE Global Communications Conference (GLOBECOM), pp. 1–6. IEEE (2019)

Deep Learning for IoT Traffic Prediction Based on Edge Computing Ali R. Abdellah1,2 , Volkov Artem2 , Ammar Muthanna2(B) , Denis Gallyamov2 , and Andrey Koucheryavy2 1

Electronics and Communications Engineering, Electrical Engineering Department, Al-Azhar University, Qena 83513, Egypt [email protected] 2 The Bonch-Bruevich Saint-Petersburg State University of Telecommunications, Pr. Bolshevikov, 22, St. Petersburg 193232, Russia [email protected], [email protected], [email protected], [email protected]

Abstract. The 5G network is the latest wireless mobile communication technology. Nowadays, the emerging of many network applications has led to a massive amount of network traffic. Many researchers have devoted their studies to the accurate prediction of network traffic applications. Network management requires technology for the prediction of network traffic without network operator intervention. In practice, 5G uses the Internet of Things (IoT) for working in high-traffic networks with multiple sensors to send their packets to a destination simultaneously, which is a feature of IoT applications. Therefore, 5G offers wide bandwidth, low delay, and extremely high data throughput. Predicting network traffic is more important for IoT networks to provide reliable communication. The efficient 5G network cannot be complete without including artificial intelligence (AI) procedures. Machine learning (ML) has been successfully applied to traffic prediction. In this paper, we implement the prediction of IoT traffic in time series using deep learning. The prediction accuracy has been evaluated using the (RMSE) as a merit function and mean absolute percentage of error (MAPE). Keywords: Internet of Things · Artificial intelligence computing · Deep learning · 5G · IMT-2030

1

· Edge

Introduction

In 2020, the beginning of a new era in telecommunications is expected - fifthgeneration 5G communication networks. 5G networks are expected to enable the effective and cost-effective implementation and support of many new services [1–3]. 5G networks should create an ecosystem for technical and business innovations, give a breakthrough to the further development of technologies in the field of ICT. It is worth noting that the designation “5G”, usually representing the technological stage of mobile networks, at the moment at the international level de facto reflects a new era of communication networks and services c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 18–29, 2020. https://doi.org/10.1007/978-3-030-66242-4_2

Deep Learning for IoT Traffic Prediction

19

in general [4]. The abbreviation 5G is usually given by the 3GPP consortium (3rd Generation Partnership Project), however, in this case, taking into account many factors (the trend of technology development, the emerging need for new services, etc.), the world community “attached” the abbreviation 5G/IMT-2020. The fifth generation communications network abbreviation IMT-2020 was given by the International telecommunication Union. Based on the set of international recommendations and standards at this time, we can conclude that the concept of IMT-2020 communication networks or otherwise fifth-generation communication networks includes a whole range of concepts and technologies, and not only describes the principles and technologies for organizing a mobile access network. At the time of 2020, it is planned to complete the standardization of communication networks and fifth-generation systems 5G/IMT-2020, as well as their widespread adoption on communication networks. 5G/IMT-2020 networks are designed to integrate all the achievements of mobile and fixed communication networks, provide data transfer speeds of 10 Gb/s and higher, as well as bring the capabilities of new cloud computing structures (Edge computing and FoG Computing) directly to the user [5]. The main feature of the fifth generation networks is due to the emergence of the concept of the Internet of Things. This feature is associated with a fundamentally different number of potential things that can be connected to the communication network and be uniquely identifiable in it, compared to traditional ideas about the volume of device databases in the network. According to the well-known forecast, the limit of the Internet of Things is considered at the level of 50 trillion. Such a number of connected devices implies a high density per unit of space. Therefore, 5G networks are called high-density networks - Super High Dense. This direction of fifth-generation communication networks has been given the name - “Communication Networks with Ultra-low latency”. However, on the basis of many scientific studies, the community came to the conclusion that at the moment of development of the elemental and technological base, such indicators are difficult to achieve to provide this type of service on an equal basis with others. However, this direction of research continues its development and smoothly proceeds to the next generation of networks, a description of which the International Telecommunication Union has already given in its document in the summer of 2018, namely, the IMT-2030 communication network. To meet the requirements for a number of new services based on the Internet of Things, to ensure the stability of communication networks as part of the development of new services, as well as the ability to automate business and system processes on networks, the International Telecommunication Union has proposed the use of the following communication network building technologies, such as SDN and NFV. Thus, when integrating new technologies for building communication networks, as well as technologies for organizing cloud computing, in particular Edge Computing, it is possible to achieve a greater synergistic effect by using artificial intelligence algorithms. It is worth noting that the approaches that are implemented in these technologies provide such a theoretical and technical opportunity, thanks to the abstraction of the level of transmission/processing and storage of data from the control level.

20

A. R. Abdellah et al.

To solve the problems of detection and forecasting, the approaches that are offered are mostly based on periodic traffic capture and analysis of the headers or a deeper analysis. However, in the era of new technologies for organizing network and computing (cloud) infrastructure, such as Software-defined networking, Network Function Virtualization (network technologies of 5G & Beyond communication networks), as well as Edge Computing & FoG Computing (Cloud computing technologies), there are new opportunities for developing methods for detecting the type of traffic, as well as its forecasting. At the same time, the predictive models, due to the technical capabilities of the modern hardware part, can take into account many characteristics of the studied traffic/system model in its general sense: for example, Tactile Internet services of one of the providers. These technical capabilities allow you to implement algorithms that require much more computing power, while these algorithms can be adapted to the particular geographic location of the forecasting system (for example, different cities/countries where the services of different providers are used, etc.), as well as time (night/morning/working day/evening). This type of algorithms, at present, is referred to as machine learning algorithms, as well as to a higher level of classification - Artificial Intelligence algorithms. Yes, of course, these algorithms, at the moment, will not be able to fully realize the AI functions that are laid down in the understanding of the world scientific community. However, already at this stage, a class of algorithms capable of processing a large amount of data, capable of adapting to a specific system, self-learning and improving, allows you to solve labor-intensive tasks, the solution of which previously the scientific and technical community could only dream of. The introduction of AI algorithms in automation tasks and a certain level of telecommunication systems intellectualization will allow reaching a new level in ICT and solving those tasks that were set for fifth-generation and subsequent communication networks (IMT-2030). For example, as part of meeting the delay requirement for a number of Internet of Things applications.

2

Related Works

Currently, advances in computing power and the development of deep learning algorithms [6–8], artificial intelligence (AI) has shown promising results in various [17,18], including in the areas of security [6,9,10], networks [11], information retrieval [12], etc. And there is no doubt that AI reduces human intervention and ensures reliable results, regardless of functioning areas. Subsequently, the development of AI can also contribute to the creation of new solutions for the efficient organization and management of data flows. With the advent of new technologies and the abundance of modern wireless devices, today there is high growth in the development of data flow.

Deep Learning for IoT Traffic Prediction

21

In addition, the production of devices with changing requirements is actively developing, that is, for the transition from 3G to 4G, and from 4G to 5G, the market is torn by smartphones, portable devices, and another device, which poses many tasks for network design. It is also expected that in the near future there will be 50 billion connected devices [13]. Therefore, this huge number of devices will impose restrictions on existing communication systems. To handle such large numbers of devices that are likely to increase the amount of transfer and connectivity, developing 5G networks will be the main and much-needed goal. It is also expected that in the coming years the data flow will be 200 times higher than in 2010, and in 2030 this will increase 20,000 times, compared with 2010 [13]. To ensure the operation of such a large number of devices and the ability to operate with a significantly increasing data flow, AI, along with new technologies such as software-configurable networks (SDN), mobile edge computing (MEC) [19], device-to-device (D2D), network function virtualization (NFV) should be used to organize and manage data flows. Software-defined Network (SDN) technology is a new network theory that separates the control and data planes of a router/switch device to achieve better control of data flow and networks. A typical application of SDN to provide and manage network traffic is dynamically shown in [8]. However, for effective control of data flows, AI algorithms are also important in this area. To implement this algorithm, the AI is equipped with an SDN controller to provide network traffic control in the radio access network. In this work, AI is used on edge computing to solve one of the main problems of 5G networks. Thus, the paper has the goal of defining an AI algorithm and edge computing for the optimal organization and management of data flows. In addition, to model the flows of data traffic in the system, we use a mathematical model. After, we develop an effective system for the data flow of 5G networks with associated mathematical methods.

3

Problem Statement

Considering the described problems, technological capabilities of SDN/NFV networks, as well as new cloud architectural approaches, in particular Edge Computing in the introduction section, it is necessary to formulate a solution for predictive analytics of the Internet of Things. As part of the solution of this problem, it is proposed to use the capabilities of programmable networks to obtain data on flows for subsequent analytics. The developed analytical models, in order to ensure a high level of predictive analytics, as well as taking into account the structure of incoming analytical data, are developed on the basis of Deep Learning technology.

22

4 4.1

A. R. Abdellah et al.

Proposed System and Algorithm Architecture of Deep Learning Implementation Based on Edge-Computing

At the time of the research, in the scientific and technical world there are many works that are aimed at detecting traffic types, developing forecasting models, [3–5,16] both traffic and the load of telecommunication systems. These tasks are more interested in service providers and telecommunications. Thus, as previously mentioned, this article proposes the use of Machine Learning algorithms with Deep Learning to generate forecasts of the activity of the Internet of Things traffic. These algorithms are a certain kind of analytical system that is deployed on a cloud structure - Edge Computing. Thus, this method of organizing analytics will allow monitoring traffic no longer entering the network, in addition, in conjunction with the forecasting system, a traffic detection system can work, which together will give a greater synergistic effect. In this paper, we consider the issue of predicting the traffic of the Internet of Things on Edge Computing nodes. The conceptual architecture of the solution is shown in Fig. 1.

Fig. 1. The architecture of the concept

The proposed approach is implemented within the framework of a distributed analytical system for forecasting the development of infrastructure, where it

Deep Learning for IoT Traffic Prediction

23

is assumed to use metadata of flows that pass through programmable SDN switches. The principle of working with stream metadata for detecting the nature of data being transmitted (video, Internet of Things and others) was proposed in [3]. In [3], a method was proposed for compiling a meta-model of flows based on two global parts of the SDN stream table, namely: Match Field and Actions. Thus, since Edge Computing is located at the “edge of the network”, that is, in fact the first object with high computing capabilities, after the infrastructure of mobile and other networks, there is the possibility of organizing an analytical module for forecasting flows, including as part of the Internet of Things. Implementation of load forecasting algorithms in the form of analytical modules will allow for portability and flexible scaling of the system, independence of the data transmission medium. For the analytical system, all devices and streams are a “digital object” and, in fact, the system operates with “digital twins” of devices, traffic, and others, which are characterized by a set of parameters (variables for neural networks of the analytical module). This level of abstraction allows you to implement an analytical system that will work with data on flows (metadata) in the “On-the-fly” mode. Thus, this system allows not introducing additional delays into the traffic, and also does not in any way alter its activity and characteristics. The analytic module under consideration is part of a distributed analytical system, including one whose functional part was considered in [3–5]. In this paper, the hypothesis is tested about the possibility of traffic prediction on Edge computing structures; for this, the infrastructure of the Programmable Networks Laboratory (SDNLab) of the Department of Communication and Data Networks of St. Petersburg State Telecommunications University was used. prof. M.A. Bonch-Bruevich. To test the performance of the above proposed method, we used a model network with a working smart city service. To generate traffic, Internet of Things traffic generators were used, working with IoTDM (Internet of Things Data Management) system, built according to the specifications of the OneM2M international community. These traffic generators were developed as part of research work, the results of which are reflected in this article [1]. Based on this infrastructure, data were collected for their subsequent processing in a mathematical model of a neural network with deep learning. The mathematical method for processing “raw” data from SDN switches is given in [3], where the final data set is described by the following matrix (1).

Where TS is the value of the data acquisition period, in this work 1 s. And the parameters BCdelta and P Cdelta indicate the number of Bits and Packets transmitted in the set time interval, according to the counters of the studied flows.

24

A. R. Abdellah et al.

In the framework of this article, as already mentioned above, from the point of view of practical implementation, modeling of the developed Neural Network is carried out in order to test the hypothesis that it is possible to predict the Internet of Things traffic using Edge Computing. 4.2

Deep Learning Algorithm for IoT Traffic Prediction

Today, the Artificial Neural Network [14–16] is widely used for various tasks in various fields of life. For example, tasks such as speech recognition, text recognition, predicting the work and development of complex engineering systems, are largely solved with the help of Artificial Intelligence technologies, including artificial neural networks. The use of these algorithms is determined by a number of their advantages, for example, such as high recognition rates of the studied objects, prediction of complex systems within a limited time, as well as complexity, from the point of view of systematic objects. A data stream from the generated DataSetM L is fed to the input layer of neurons (the so-called placeholders). Placeholders are connected to the first neural network layer by a fully connected architecture. In this work, we perform IoT traffic prediction approaches using LSTM with deep learning. The prediction accuracy was evaluated using the RMSE as merit function and MAPE (mean absolute percent of error) and we tested the performance in three cases according to the number of hidden units in network. We made the prediction in cases of numbers of hidden units, 500, 100, 50, respectively. Input and output time series depends on predicting the future value of one time-series is given another time-series. The past values of both series (for best accuracy), or only one of the series (for a simpler system) may be used to predict the target series.

5

Simulation Results

The dataset can be used to show how LSTM with deep learning can be trained to make predictions. The datasets are obtained from IoT traffic the model was simulated using method, which was described above. Then, the collection and preparation of the data set that was divided into 70%, 30% for training, and testing, respectively. The implementation of the feedback neural network to predict the performance accuracy of IoT traffic. Table 1 shows the prediction accuracy for the IoT throughput using RMSE and MAPE.

Deep Learning for IoT Traffic Prediction

25

Table 1. The measure of prediction accuracy for the predicted model validation using RMSE and MAPE. Hidden units RMSE

MAPE

500

0.93432 2.4

100

2.4163

9.32

50

6.5104

16.75

Table 1 displays the prediction accuracy of IoT traffic in case of the number of hidden units in LSTM layer are 500, 100, 50, respectively in order to estimate the error of prediction we use the RMSE and another measure for performance accuracy MAPE. From the tabulated results, the model predicted in the case of number hidden units 500 has the best prediction accuracy with RMSE value equal 0.93432 and MAPE equal 2.4% in comparison to its peers. The maximum average prediction accuracy improvement in the case of 500 hidden units is 14.35%. Also, the model predicted in the case of 100 hidden units dropped to has a prediction accuracy with RMSE value 2.4163 and the MAPE dropped to 9.32% and the maximum average of prediction accuracy in this case is 7.43%. On the other hand, the model predicted in the cases of a number of hidden units 50 has the lowest prediction accuracy with RMSE value 6.5104 and MAPE dropped to 16.75% comparison of them. Figures 2, 3 and 4 shows the prediction accuracy for the IoT throughput using RMSE.

Fig. 2. The response of output element for time series in case of the number of hidden units 500

26

A. R. Abdellah et al.

Figure 2 shows the prediction accuracy of IoT traffic using LSTM approach with deep learning in the case of number of hidden units 50. The model predicted in the case of 500 hidden units has the least prediction accuracy with RMSE value equal 0.93432 and the improvement is 14.35% in comparison to its peers. I Fig. 2 show two curves the first curve observes the prediction for IoT throughput with time and the second curve observes the prediction error with time. The prediction time 60 for verifying the ability of the LSTM deep learning in for optimizing the IoT traffic load prediction in the cases of the number of hidden units 500. As shown in Fig. 2 the throughput with time for the YTest and YPred (predicted model) models we notice that the predicted model increase at time 1 then decreases gradually until the time 9 then little increase then little decrease the time 59 which gives the best prediction accuracy in this case.

Fig. 3. The response of output element for time series in case of the number of hidden units 100

Figure 3 shows the prediction accuracy of IoT traffic using LSTM approach with deep learning in the case of number of hidden units 50. The model predicted in the case of 100 hidden units has the least prediction accuracy with RMSE value equal 2.4163 and the improvement is 7.43% in comparison to its peers. Figure 3 show two curves the first curve observes the prediction for IoT throughput with time and the second curve observes the prediction error with time. The prediction time 60 for verifying the ability of the LSTM deep learning in for optimizing the IoT traffic load prediction in the cases of the number of hidden units 50. As shown in Fig. 3 the throughput with time for the YTest and YPred (predicted model) models we notice that the predicted model increase at time 1 then decreases gradually until the time 5 then until time 14 increase then little decrease the time 60 which gives the best prediction accuracy in this case.

Deep Learning for IoT Traffic Prediction

27

Fig. 4. The response of output element for time series in case of the number of hidden units 50

Figure 4 shows the prediction accuracy of IoT traffic using LSTM approach with deep learning in the case of number of hidden units 50. The model predicted in the case of 50 hidden units has the least prediction accuracy with RMSE value equal 6.5104 in comparison with its peers. Figure 4 show two curves the first curve observes the prediction for IoT throughput with time and the second curve observes the prediction error with time. The prediction time 60 for verifying the ability of the LSTM deep learning in for optimizing the IoT traffic load prediction in the cases of the number of hidden units 50. As shown in Fig. 4 the throughput with time for the YTest and YPred (predicted model) models we notice that the predicted model increase at time 1 then decreases gradually until the time 10 then little increase then become constant until the time 59 which gives the best prediction accuracy in this case.

6

Conclusion and Future Work

This paper has proposed a method for predicting the Internet of Things traffic in 5G/IMT-2020 communication networks with the possibility of its further implementation within the technological areas of IMT-2030 communication networks. In this paper, we discussed artificial intelligence methods to solve some problems in communication networks. In results was implemented the prediction of IoT traffic in time series using deep learning the prediction accuracy has been evaluated using the (RMSE) as a merit function and mean absolute percentage of error (MAPE). Our proposed deep learning algorithm for IoT prediction was developed at edge computing, it has performed IoT traffic prediction methods based on deep learning, the prediction accuracy was evaluated using the RMSE as a merit function and MAPE. Finally was tested the performance in three cases according to the number of hidden units in the network.

28

A. R. Abdellah et al.

Acknowledgments. The publication has been prepared with the support of the grant from the President of the Russian Federation for state support of young russian scientists - doctors of science MD-2454.2020.9.

References 1. Volkov, A., Khakimov, A., Muthanna, A., Kirichek, R., Vladyko, A., Koucheryavy, A.: Interaction of the IoT traffic generated by a smart city segment with SDN core network. In: Koucheryavy, Y., Mamatas, L., Matta, I., Ometov, A., Papadimitriou, P. (eds.) WWIC 2017. LNCS, vol. 10372, pp. 115–126. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-61382-6 10. 0302-9743 eISSN: 1611-3349 2. Ateya, A., Muthanna, A., Gudkova, I., Vybornova, A., Koucheryavy, A.: Intelligent core network for Tactile Internet system. In: International Conference on Future Networks and Distributed Systems, p. 15. ACM, Cambridge (2017) 3. Artem, V., Ateya, A.A., Muthanna, A., Koucheryavy, A.: Novel AI-based scheme for traffic detection and recognition in 5G based networks. In: Galinina, O., Andreev, S., Balandin, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART 2019. LNCS, vol. 11660, pp. 243–255. Springer, Cham (2019). https://doi.org/10.1007/ 978-3-030-30859-9 21 4. Muthanna, A., Volkov, A., Khakimov, A., Muhizi, S., Kirichek, R., Koucheryavy, A.: Framework of QoS management for time constraint services with requested network parameters based on SDN/NFV infrastructure. In: International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, vol. 2018-November. IEEE Computer Society (2019). https://doi.org/10.1109/ICUMT. 2018.8631274 5. Volkov, A., Proshutinskiy, K., Adam, A.B.M., Ateya, A.A., Muthanna, A., Koucheryavy, A.: SDN load prediction algorithm based on artificial intelligence. In: Vishnevskiy, V.M., Samouylov, K.E., Kozyrev, D.V. (eds.) DCCN 2019. CCIS, vol. 1141, pp. 27–40. Springer, Cham (2019). https://doi.org/10.1007/978-3-03036625-4 3 6. Rathore, H., Agarwal, S., Sahay, S.K., Sewak, M.: Malware detection using machine learning and deep learning. In: Mondal, A., Gupta, H., Srivastava, J., Reddy, P.K., Somayajulu, D.V.L.N. (eds.) BDA 2018. LNCS, vol. 11297, pp. 402–411. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-04780-1 28 7. Sewak, M., Sahay, S.K., Rathore, H.: An investigation of a deep learning based malware detection system. In: Proceedings of the 13th International Conference on Availability, Reliability and Security, p. 26. ACM (2018) 8. Sahay, S.K., Sewak, M., Rathore, H.: Comparison of deep learning and the classical machine learning algorithm for the malware detection. In: 19th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD). IEEE (2018) 9. Roul, R.K., Nanda, A., Patel, V., Sahay, S.K.: Extreme learning machines in the field of text classification. In: IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD). IEEE (2015) 10. Sharma, A., Sahay, S.K.: An effective approach for classification of advanced malware with high accuracy. Int. J. Secur. Appl. 10(4), 249–266 (2016) 11. Boutaba, R., Salahuddin, M.A., Liman, N., et al.: J. Internet Serv. Appl. 9, 16 (2018). https://doi.org/10.1186/s13174-018-0087-2

Deep Learning for IoT Traffic Prediction

29

12. Roul, R.K., Sahay, S.K.: Categorizing text data using deep learning: a novel approach. In: Behera, H.S., Nayak, J., Naik, B., Abraham, A. (eds.) Computational Intelligence in Data Mining. AISC, vol. 711, pp. 793–805. Springer, Singapore (2019). https://doi.org/10.1007/978-981-10-8055-5 70 13. Evans, D.: The Internet of Things: how the next evolution of the internet is changing everything. CISCO White Paper 1, pp. 1–11 (2011) 14. Abdellah, A.R., Muthanna, A., Koucheryavy, A.: Robust estimation of VANET performance-based robust neural networks learning. In: Galinina, O., Andreev, S., Balandin, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART 2019. LNCS, vol. 11660, pp. 402–414. Springer, Cham (2019). https://doi.org/10.1007/978-3-03030859-9 34 15. Abdellah, A.R., Muthanna, A., Koucheryavy, A.: Energy estimation for VANET performance based robust neural networks learning. In: Vishnevskiy, V.M., Samouylov, K.E., Kozyrev, D.V. (eds.) DCCN 2019. CCIS, vol. 1141, pp. 127– 138. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-36625-4 11 16. Abdellah, A.R., Mahmood, O.A.K., Paramonov, A., Koucheryavy, A.: IoT traffic prediction using multi-step ahead prediction with neural network. In: IEEE 11th International Congress on Ultra-Modern Telecommunications and Control Systems and Workshops (ICUMT) (2019) 17. Ellah, A.R.A., Essai, M.H., Yahya, A.: Robust backpropagation learning algorithm study for feed forward neural networks. Thesis, Al-Azhar University, Faculty of Engineering (2016) 18. Sopin, E., Samouylov, K., Shorgin, S.: The analysis of the computation offloading scheme with two-parameter offloading criterion in fog computing. In: Montella, R., Ciaramella, A., Fortino, G., Guerrieri, A., Liotta, A. (eds.) IDCS 2019. LNCS, vol. 11874, pp. 11–20. Springer, Cham (2019). https://doi.org/10.1007/978-3-03034914-1 2 19. Daraseliya, A.V., Sopin, E.S., Samuylov, A.K., Shorgin, S.Y.: Comparative analysis of the mechanisms for energy efficiency improving in cloud computing systems. In: Galinina, O., Andreev, S., Balandin, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART 2018. LNCS, vol. 11118, pp. 268–276. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-01168-0 25

On Optimal Placement of Base Stations in Wireless Broadband Networks to Control a Linear Section with End-to-End Delay Limited Amir Mukhtarov1(B) , Oleg Pershin2 , Andrey Larionov1 , and V. M. Vishnevsky1 1

2

V.A. Trapeznikov Institute of Control Sciences of RAS, 65 Profsoyuznaya street, 117997 Moscow, Russia [email protected], [email protected], [email protected] Gubkin Russian State University of Oil and Gas (National Research University), 65 Leninsky Prospekt, 119991 Moscow, Russia [email protected] Abstract. The paper is dedicated to the design problem of a wireless communication network. The problem of base stations optimal placement along a linear section subject to control with end-to-end delay limited is formulated. The goal is to maximize the coverage area that comes to under the control of multiple deployed base stations while respecting technological conditions and budget constraints. In the paper, the features of the technological statement are analyzed. The formulation of the problem in the form of integer linear programming is proposed. When forming a mathematical model, a queuing network model with a Poisson arrival process is used. Keywords: Wireless network flow

1

· Integer linear programming · Poisson

Introduction

Wireless technologies are widely used in various areas of human life. Wireless broadband communication networks are used for operational control of industrial or civil objects, technological plants, smart moving vehicles. The use of wireless broadband technologies based on the IEEE 802.11 protocols family to organize such networks has several advantages over wired technologies. These include rapid deployment of communication networks, convenient modernization and scalability of the network architecture, and reduced installation and maintenance costs. To improve the design efficiency of such a modern information transmission infrastructure, it is crucial to solving the problem of optimal placement of equipment, in our case, base stations of a wireless broadband communication network The publication was supported in part by Russian Foundation for Basic Research (RFBR) according to the research project No. 19-07-00919. c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 30–42, 2020. https://doi.org/10.1007/978-3-030-66242-4_3

On Optimal Placement of Base Stations

31

at various possible locations. A similar problem has been proposed and discussed in several works [1,4,8,9,11–13]. This work is a continuation of the researches [7] and [6], where the particular case of the problem is considered when the controlled area is a linear section, for example, the area along highways, the linear part of trunk pipelines, field communications. In the above papers, the formulation was given in the form of an integer linear programming model. The proof of NP – completeness was presented. The problem considered in the previous work [6] it was necessary to place a given base station set formed at the previous network design stages. The present paper considers a more general case when solving an optimization problem is also determined by a set of placed stations from a given redundant set while respecting technical and economic constraints. This paper presents the preparation of main station characteristics, such as the coverage radius, link distance, and station service time. We need to prepare these characteristics before proceeding to the optimal placement problem. The paper proposes the problem in the form of an integer linear programming with the input of the above-calculated characteristics into the problem conditions with the end-to-end delay constraint. This restriction significantly impacts the mathematical model form of the problem.

2

Problem Statement

The problem is stated as follows. To control a given linear section, we need to place base transceiving stations (from now on referred to as stations) in such a way as to obtain maximum section coverage with restrictions on the total cost of the placed stations and end-to-end delay of signal transmission. It is essential to ensure the availability of communication of any station with gateways at the ends of the section through a system of placed stations. A set of base stations S = {sj } is given. Each station has characteristics sj = {rj , {Rjq }, μj , cj }, j = 1, . . . , m; q = 1, . . . , m; q = j. Here rj is a coverage radius of a station, Rjq is a link distance between stations sj and sq , μj is a service time rate and cj is a cost. Let we have a line segment of length L with the end points a0 and an+1 . Inside of the segment [a0 , an+1 ] a finite set of arranged points A = {ai }, i = 1, . . . , n is given; these points correspond to the set of vacant places where the stations can be placed. Each point ai is defined with its one-dimensional coordinate li . There is a special station type sm+1 which is gateway. These stations are already placed at the ends a0 and an+1 of the segment. For those stations rm+1 = 0. A link distance, a station service time, and a cost are not set. It is required to place the stations in order to maximize a covered area of the segment by them, provided communication of each station with gateways through the system of placed stations and restrictions on the end-to-end delay T and cost C. Let calculate characteristics of the station, such as link distance Rjq , coverage radius rj , and service time rate μj before proceeding to integer programming.

32

3

A. Mukhtarov et al.

Calculation of Link Distance and Coverage Radius of Stations

It is essential during deployment to provide maximum coverage of a given area and ensure communication between the placed base stations in the wireless broadband network. Link Budget is a way of estimation of communication link’s performance while accounting for the system’s power, gains, and losses for both the transmitter and receiver. The complete equation can be written as follows: Ptr − Ltr + Gtr − Lf s + Grecv − Lrecv = SOM + Precv ,

(1)

where: – – – – – – – –

Ptr is a transmitter output power, [dBm]; Ltr is a transmitter losses, [dB]; Gtr is a transmitter antenna gain, [dBi]; Lf s is a free space path loss, [dB]; Grecv is a receiver antenna gain, [dBi]; Lrecv is a receiver losses, [dB]; SOM is a system operating margin, [dB]; Precv is a receiver sensitivity, [dBm].

The power received at the antenna is calculated by the Friis transmission equation:  2 c Precv = Gtr Grecv , Ptr 4πRf where c is a speed of light, f is a frequency, R is a distance between transmit and receive antenna. The Free Space Path Loss (F SP L) equation defines the propagation signal loss between two antennas through free space (air):  F SP L =

4πRf c

2 .

(2)

The formula (2) expressed in decibels will be calculated as: Lf s = 20 lg F + 20 lg R + K,

(3)

where F is a radio wave centre frequency of a communication link, R is a distance between transmit and receive antennas, and K is a constant. Constant K depends on frequency and distance: – for a frequency in GHz and a distance in km, constant K is equal to 92.45; – for a frequency in MHz and distance in km, constant K is equal to 32.4; – for a frequency in MHz and distance in m, constant K is equal to −27.55.

On Optimal Placement of Base Stations

33

The loss Lf s is expressed from the formula (1) as follows: Lf s = Ptr − Ltr + Gtr + Grecv − Lrecv − SOM − Precv .

(4)

Then the communication link equation is obtained from the formulas (3) and (4):   R = 10

Lf s −20 lg F −K 20

.

(5)

Using formulas (5) and (4), we can calculate the theoretical maximal communication link distance Rjq between base stations and the coverage radius rj assuming the absence of obstacles, reflections, influence of terrain contours, etc. This is acceptable for our case of an open area.

Fig. 1. The link between stations.

To calculate communication link distance Rjq (Fig. 1), base stations sj and sq will be considered as a transmitter and a receiver stations, with directional R antenna for which gains GR tr and Grecv , respectively.

Fig. 2. Base station coverage.

34

A. Mukhtarov et al.

Each base station is equipped with an omnidirectional antenna with given gain antenna Grtr . A station uses this antenna to cover a given area. Calculating the coverage radius rj (Fig. 2) base station will be considered a transmitter and a user device will be considered a receiver.

4

Tandem Queue Model for End-to-End Delay Evaluation

Each station is characterized by its throughput. Given a throughput and an average packet size, we can calculate the service time rate as follow: μj =

pj , w

where pj is a throughput [Mbit/s] of station Sj , and w is an average packet size [Mbit]. This characteristic μj is required to calculate delay time Tj at each station. One of the main performance metric in wireless network design is its end-toend delay [2,14]. To calculate end-to-end delay, let us consider a wireless network as a tandem queuing model with cross-traffic and M/M/1 nodes, with Poisson input flow and an exponential distribution of the service times (Fig. 3).

Fig. 3. Tandem queueing model M/M/1 → . . . → ·/M/1.

The interval between arrivals is set by the random variable A ∼ fA (t), fA (t) = λe−λt and the service time in such a system is set directly using the random variable B ∼ fB (t), fB (t) = μe−μt . Taking into account that the input packets are represented by a Poisson flow and the service time at the station belongs to the exponential distribution, according to Burke’s theorem [3], at the exit from the node we also have a Poisson flow. To estimate end-to-end delays, we can use well-known formulas for M/M/1 systems [5]. For station sj , the utilization is ρj = μλj . The average number of packets on such a system is Nj =

ρj λ . = 1 − ρj μj − λ

On Optimal Placement of Base Stations

35

By Little’s law [10] the average time delay at each station is Tj =

Nj 1 = . λ μj − λ

Then end-to-end delay is T =



Tj ,

Tj =

j

5

1 . μj − λ

(6)

Integer Linear Programming Model

After estimating maximum communication link distances between stations Rjq , the maximum coverage radiuses rj , and the delays at the network station Tj , it is possible to move to the problem in the form of integer linear programming. Let yi+ and yi− , i = 0, n + 1 determine the size (the right and left, correspondingly) of stations covering at place ai . The parameters yi+ and yi− can take non-negative integer values only. + − , yn+1 are equal to 0. Values of variables for gateways coverages y0+ , y0− , yn+1 Objective function will be presented as: f=

n  i=1

(yi− + yi+ ) → max

(7)

Let’s also introduce binary variables xij . Then xij is equal to 1, if station sj is placed at point ai and xij = 0 otherwise; i = 1, n; j = 1, m. Let us introduce binary variables ei . Then ei is equal to 1, if any station is placed at point ai and ei is equal to 0 otherwise; i = 1, n. For gateways placement points e0 is equal to 1 and en+1 is equal to 1. Let us formulate the following system of the problem constraints. By definition (8): m  xij , i = 1, n. (8) ei = j=1

Each station must be placed in only one point (9): n 

xij ≤ 1,

j = 1, m.

(9)

j=1

The values of coverages are no more than the coverage radius of the station placed at ai , and equal to 0 if there is no station at ai (10)–(11): yi+ ≤

m  j=1

xij rj ,

i = 1, n;

(10)

36

A. Mukhtarov et al.

yi− ≤

m 

xij rj ,

i = 1, n.

(11)

j=1

The total coverage area between any two points ai and ak , where the stations are located cannot exceed the distance between these points (12)–(13). yi+ + yk− ≤

lk − l i (ei + ek ) + (2 − ei − ek )L, 2

i = 1, n,

k = i + 1, n + 1; (12)

li − l k (ei + ek ) + (2 − ei − ek )L, i = 1, n, k = i − 1, 0, (13) 2 where lk and li are the coordinates of the points ai and ak , respectively. This condition excludes the effect from intersections of station coverages when calculating the total coverage value for the entire segment. According to the conditions of the problem, the station located at ai must be connected with at least one station on the left and one station on the right, including stations at the end points a0 and an+1 . We will introduce binary variables zijkq , i = 1, n; j = 1, m; k = 1, n, k = i; q = 1, m, q = j. The variable zijkq is equal to 1, if there is a station sj at point ai and it is connected with a station sq placed at the point ak ; and zijkq is equal to 0 otherwise. The variable zij0(m+1) is equal to 1, if here is a station sj at point ai and it is connected with a gateway sm+1 at the point a0 ; zij0(m+1) is equal to 0 otherwise. The variable zij(n+1)(m+1) is equal to 1, if here is a station sj at point ai and it is connected with a gateway sm+1 at the point an+1 ; zij0(m+1) is equal to 0 otherwise. Stations must be at both points ai and ak so that they can be connected (14)–(15): yi− + yk+ ≤

zijkq ≤ ei ,

i = 1, n;

zijkq ≤ ek ,

k = 1, n;

j = 1, m; j = 1, m;

k = 1, n, k = i;

q = 1, m, q = j;

(14)

i = 1, n, i = k;

q = 1, m, q = j.

(15)

It is necessary that station sj at point ai is connected to any one station located at point ak , to the right of ai (k > i) or to the right gateway sm+1 (16)–(17). n m  

zijkq + zij(n+1)(m+1) = xij ,

i = 1, n,

j = 1, m.

(16)

k=i+1 q=1 q=j

Station sj placed at an has only gateway sm+1 from the right at place an+1 (17). znj(n+1)(m+1) = xnj

j = 1, m.

(17)

Also, at least, it is connected with any one station located at point ak to the left of point ai (k < i) or with the left gateway sm+1 (18)–(19). z1j0(m+1) = xij ,

j = 1, m;

(18)

On Optimal Placement of Base Stations

37

Station sj placed at a1 has only gateway sm+1 from the left at place a0 (18). zij0(m+1) +

i−1  

zijkq = xij ,

i = 2, n,

j = 1, m.

(19)

k=1 q=1 q=j

It is necessary that station sq at point ak is connected to any one station to the right located at point ai (20). n m  

k = 1, n − 1,

zijkq = xkq ,

q = 1, m;

(20)

i=k+1 j=1 j=q

Also, station sq at point ak is connected to any one station to the left located at point ai (21). k  m 

zijkq = xkq ,

k = 2, n,

q = 1, m;

(21)

i=1 j=1 j=q

Inequalities (14)–(15) and equalities (16)–(21) provide a condition for symmetry of communication between base stations located at points ai and ak for all i, k. If station sj and sq are connected the maximal communication link distance of these placed stations must be no less than the distance between ai and ak , where si and sq are located. Formally, this can be stated as (22)–(23). For i = 1, n: zijkq (Rjq − (ai − ak )) ≥ 0, zijkq (Rjq −(ak −ai )) ≥ 0,

k = 0, i − 1;

k = i + 1, n + 1;

j = 1, m; j = 1, m;

q = 1, m, q = j;

(22)

q = 1, m, q = j. (23)

Let T be network end-to-end delay time limit. Using formula (6) to calculate the delay at each station, we write the inequality as: m n  

xij · Tj ≤ T.

(24)

xij · cj ≤ C.

(25)

i=1 j=1

And for cost limit C we have: n  m  i=1 j=1

38

6

A. Mukhtarov et al.

Example

Let’s look at one simple case of base stations placement problem. Consider the section of length L = 400 with n = 10 placement points is given in Table 1: Table 1. Placement points at the section of length L = 400. ai

a1 a2 a3

a4

a5

a6

a7

a8

a9

a10

Coordination 32 65 101 142 181 241 270 301 325 380

There are m = 7 base stations with parameters given in Table 2: – – – – – – –

R is a transmit power for communication with base stations; Ptr GR tr is an antenna gain for communication with base stations; R is a sensitivity for communication with base stations; Precv r is a transmit power for the coverage of section; Ptr Grtr is an antenna gain for the coverage of section; p is a throughput; c is a base station cost.

Table 2. Base station parameters. R BS Ptr

GR tr

R Precv

r Ptr

Grtr

p

c

No [dBm] [dBi] [dBm] [dBm] [dBi] Mbit/s c.u 1

19

5

−69

20

2

54

2300

2

19

4

−80

19

3

54

1200

3

19

6

−69

18

2

54

4500

4

19

5

−83

18

3

54

6000

5

20

5

−85

20

2

54

3500

6

22

5

−69

18

2

54

4200

7

19

5

−69

18

2

54

4200

Finally, gateway stations of special type sm+1 placed on the ends of the segment are specified. Gateway parameters is given in Table 3:

On Optimal Placement of Base Stations

39

Table 3. Gateway parameters. Gateway GR tr

6.1

R Precv

No

[dBi] [dBm]

sm+1

3

−69

Computation of the Communication Link Distance Between Base Stations

Base station is equipped with a directional antenna with a high gain to communicate with neighbouring stations. To calculate the losses between stations j and q, we use the formula (4): R R R R Ljq f s = Ptr (j) − Ltr + Gtr (j) + Gtr (q) − Lrecv − SOM − Precv (q).

The cable losses at the receiver Lrecv and transmitter Ltr are equal to 1 dB. We will also provide system operating margin SOM = 10 dB. Let us carry out an example of the calculation communication link between stations s1 and s2 : R R R R L12 f s = Ptr (1) − Ltr + Gtr (1) + Gtr (2) − Lrecv − SOM − Precv (2)

= 19 − 1 + 5 + 4 − 1 − 10 − (−80) = 96(dB).

(26)

To calculate the communication link, formula (5) must be used. The stations operate on 6th channel, carrier frequency f = 2437 MHz and coefficient K = −27.55: 

Rjq = 10

jq L −20 lg F −K fs 20



96−20 lg 2437−(−27.55) ) = 617(m). 20 = 10(

(27)

Table 4 summarizes the maximal communication link distances calculations between all stations sj , j = 1, . . . , m, and the gateway sm+1 . 6.2

Computation of the Coverage Radius

To cover a given section, the base station is equipped with an isotropic antenna r with output power Ptr and gain Grtr is equal to 0. The cable loss Ltr is equal to 1. A coverage area depends on a base station, as well as user device characteristics. Let us consider a user device with an antenna sensitivity PRX = −67 dBm and gain GRX = 0. Loss LRX is equal to 0. Free space path loss between the j-th station and the user device r Ljf s = Ptr (j) − Ltr − SOM − PRX .

To calculate the coverage radius, must be used the formula (5). The stations operate on 6th channel, carrier frequency f = 2437 MHz and coefficient K = −27.55   rj = 10

j L −20 lg F −K fs 20

.

40

A. Mukhtarov et al. Table 4. The calculation of communication link distance between stations. Rjq , (m) s1

s2

s1



617 219 978

s3

s4

s2

174 –

s3

219 692 –

s4

195 617 219 –

s5

219 692 245 1 098 –

s6

275 872 309 1 382 1 740 –

s7

195 617 219 978

195 872 1098

s5

s6

s7

sm+1

1 232 195 195 123 1 098 174 174 109 1 382 219 219 138 1 232 195 195 123 219 219 138 275 174

1 232 195 –

123

An example of calculating the coverage radius for the 1-st station: r1 = 10(

20−1+2−10−(−67)−20 lg 2437−(−27.55) 20

) = 77(m)

Let’s calculate the coverage radius for all stations sj , j = 1, . . . , m (Table 5). Table 5. Calculation of the coverage radius of stations. STA s1 s2 s3 s4 s5 s6 s7 rj

6.3

77 77 61 69 77 61 61

Time Delay Calculation

Let’s calculate the delay for station s1 . The specified throughput is p1 = 54 Mbit/s. Let’s assume that the average package size is w = 2700 KByte (21.6 MBit). The arrival package rate is λ = 0.5(s−1 ). Then the service rate according to the formula (4) will be μ1 =

54 = 2.5(s−1 ). 21.6

The utilization is equal to ρ1 =

0.5 = 0.2. 2.5

The average package size is N1 =

0.2 = 0.25. 1 − 0.2

T1 =

0.25 = 0.5(s). 0.5

The average delay is

On Optimal Placement of Base Stations

41

Communication links between stations Rjq , the coverage radius of the station is rj , the delays Tj are calculated, it is possible to search the optimal placement. The problem formulated on the basis of (7)–(25) and given constraints on the cost C = 18000 and end-to-end delay T = 3 was solved by MATLAB Optimization Toolbox. The optimal placement is presented in the Table 6. Table 6. Solution result. Placed station

s6 s7 –



s2 –

s5 –

s1 –

Placement coordination a1 a2 a3 a4 a5 a6 a7 a8 a9 a10

Obtained total coverage f is equal to 400 (m) with total cost c is equal to 15400 (c.u.), and end-to-end delay T is equal to 2.5 (s).

7

Conclusion

The paper considers the problem of finding an optimal placement of the given redundant set of base stations of wireless broadband communication network on a set of possible placement points to maximize the coverage area while respecting technological conditions and budget constraints. To calculate a limit on the network delay time a network is considered as a tandem queue model with M/M/1 nodes. The problem is formulated in the form of the integer linear programming model. Numerical example solution was presented. It is planned to use the obtained model in practice in future work.

References 1. Ben Brahim, M., Drira, W., Filali, F.: Roadside units placement within city-scaled area in vehicular ad-hoc networks. In: Proceedings of the 2014 International Conference on Connected Vehicles and Expo, ICCVE 2014, pp. 1010–1016 (2014). https://doi.org/10.1109/ICCVE.2014.7297500 2. Bendel, D., Haviv, M.: Cooperation and sharing costs in a tandem queueing network. Eur. J. Oper. Res. 271(3), 926–933 (2018). https://doi.org/10.1016/j.ejor. 2018.04.049 3. Burke, P.J.: The output of a queuing system. Oper. Res. 4(6), 699–704 (1956). https://doi.org/10.1287/opre.4.6.699 4. Chattopadhyay, A., Blaszczyszyn, B., Keeler, H.P.: Gibbsian on-line distributed content caching strategy for cellular networks. IEEE Trans. Wirel. Commun. 17(2), 969–981 (2018). https://doi.org/10.1109/TWC.2017.2772911 5. Heyman, D.P.: Queueing Systems, Volume 1: Theory by Leonard Kleinrock. Wiley, New York (1975). $19.95, 417 p. Networks 6(2), 189–190 (1976). https://doi.org/ 10.1002/net.3230060210

42

A. Mukhtarov et al.

6. Ivanov, R., Mukhtarov, A., Pershin, O.: A problem of optimal location of given set of base stations in wireless networks with linear topology. In: Vishnevskiy, V.M., Samouylov, K.E., Kozyrev, D.V. (eds.) DCCN 2019. CCIS, vol. 1141, pp. 53–64. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-36625-4 5 7. Ivanov, R., Pershin, O., Larionov, A., Vishnevsky, V.: On a problem of base stations optimal placement in wireless networks with linear topology. In: Vishnevskiy, V.M., Kozyrev, D.V. (eds.) DCCN 2018. CCIS, vol. 919, pp. 505–513. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-99447-5 43 8. Khireddine, A., Amine, O.M.: Base station placement optimization using genetic algorithms approach. Int. J. Comput. Aided Eng. Technol. 12(1), 1 (2020). https:// doi.org/10.1504/ijcaet.2020.10006440 ˙ Iloz, ˙ 9. KIz H.E.: On base station localization in wireless sensor networks. Balkan J. Electr. Comput. Eng. 8, 57–61 (2020). https://doi.org/10.17694/bajece.613154 10. Little, J.D.C.: A proof for the queuing formula: L = λ W. Oper. Res. 9(3), 383–387 (1961). https://doi.org/10.1287/opre.9.3.383 11. Liu, H.Q., Ding, S.J., Yang, L.C., Yang, T.: A connectivity-based strategy for roadside units placement in vehicular ad hoc networks. Int. J. Hybrid Inf. Technol. 7(1), 91–108 (2014). https://doi.org/10.14257/ijhit.2014.7.1.08 12. Reis, A.B., Sargento, S., Neves, F., Tonguz, O.K.: Deploying roadside units in sparse vehicular networks: what really works and what does not. IEEE Trans. Veh. Technol. 63(6), 2794–2806 (2014). https://doi.org/10.1109/TVT.2013.2292519 13. Shen, C., Yun, M., Arora, A., Choi, H.-A.: Efficient mobile base station placement for first responders in public safety networks. In: Arai, K., Bhatia, R. (eds.) FICC 2019. LNNS, vol. 70, pp. 634–644. Springer, Cham (2020). https://doi.org/10.1007/ 978-3-030-12385-7 46 14. Wu, K., Shen, Y., Zhao, N.: Analysis of tandem queues with finite buffer capacity. IISE Trans. 49(11), 1001–1013 (2017). https://doi.org/10.1080/24725854.2017. 1342055

CPU vs GPU Performance of MATLAB Clustering Algorithms Andrey Ivanov1(B) , Ziazina Natalia1,2 , and Antonova Veronika1,3 1

BMSTU, ul. Baumanskaya 2-ya, 5/1, Moscow, Russia [email protected], [email protected], ant [email protected] 2 ISP RAS, Alexander Solzhenitsyn St., 25, Moscow, Russia 3 IRE RAS, Mokhovaya 11-7, Moscow, Russia

Abstract. Clustering is one of machine learning’s tasks when given objects must be split into specific groups based on distance between them. Its applications include different fields such as pattern matching, data compression and image analysis. Many programing languages allow to create clustering algorithms, though using already implemented ones is much easier. MATLAB includes a few of them. Knowing the performance of MATLAB’s cluster analysis algorithms may help choose the more optimal hardware for a given problem. Keywords: MATLAB · Performance · Clustering · Machine learning Inetl · AMD · Nvidia · GPU · CPU · K-means · DBSCAN · Hierarchical Clustering

1

·

Clustering Analysis

In mathematical notation, clustering problem is such: given is a set X: x1 , x2 , x3 , x4 , . . . xm , their labels Y: y(x1 ), y(x2 ), y(x3 ), y(x4 ), . . . , y(xm ). On the set X a metric ρ(x, x ) is given. It is necessary to group the sample into subsets (clusters), assign the label yi ∈ Y to each object xi ∈ X, so that the objects inside each cluster are close relative to the metric ρ, and objects from different clusters are significantly farther. The clustering algorithm is a function F: X → Y, which associates the cluster identifier y ∈ Y with any object x ∈ X. It is postulated that: 1. The clustering algorithm a is scale invariant. 2. The set of clustering results of algorithm a, depending on the change in the distance function ρ, must coincide with the set of all possible partitions of the set of objects X. 3. The clustering algorithm is consistent. Clustering results vary between different algorithms. Also, some may require a predefined number of clusters, while others don’t. The work is partially supported by the Russian Foundation for Basic Research (project No. 19-07-00525 A – Developing flow-based models of routing problems in telecommunications networks). c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 43–56, 2020. https://doi.org/10.1007/978-3-030-66242-4_4

44

2

A. Ivanov et al.

Clustering Algorithms in MATLAB

An overview of MATLAB’s clustering algorithms (built-in): 1. Hierarchical Clustering – does not require number clusters, cannot detect anomalies. It creates a dendrogram, consisting of multiple levels of clusters. Resembles a tree of clusters [3,4]. 2. k-Means – input should specify the number of groups. The shape of the cluster is spheroidal. Not useful for outlier detection. It is assumed that every object belongs to one of k classes, which are defined by a central vector. Classes are formed so that the square of distance from an object to the centroid is minimal [1–3]. 3. Density-Based Spatial Clustering of Algorithms with Noise (DBSCAN) – does not need the number of clusters, can detect oddity in data. It takes the density of objects into account. The shape of clusters is arbitrary [3,6]. 4. Gaussian Mixture Models (GMM) – the number of clusters is required. Can detect anomalies, since the algorithm works with distribution. The shape of clusters is clusters [3]. 5. Nearest Neighbors – can work without specified number of groups. As they name states, the algorithm is distance-based, and because of that the shape of clusters is arbitrary [3,5]. 6. Spectral clustering – can estimate the number of clusters, although works better if the value is predefined. The shape is arbitrary [3]. Because of the clustering analysis’ nature, there is no right or wrong algorithm. It all depends on the data that should be split up. The performance of the algorithms is also dependent on the data. Some methods scale better with more cores and threads, some don’t. Different algorithms require a different amount of calculations and some need specialized operations such as exponents, which means that performance is also dependent on supported hardware operations.

3

Benchmark Details

MATLAB has built-in tools to measure time. It is either tic/toc start timer/end timer or timeit function. This research will use tic/toc [11]. Time intervals of 500 clustering function calls will be recorded, their average and sample standard deviation will be calculated. In order to minimize distortion, the MATLAB process’ priority will be set to Realtime before the benchmark is run. The following hardware will be used during tests: 1. AMD Ryzen 3900X, 12 cores @ 3.8 GHz base on x570 chipset and 32 GB of DDR4 3200 MHz RAM. 2. The processor above with Nvidia RTX 2080ti, 4352 CUDA cores & 11 GB of VRAM. 3. Intel core i7-3770k, 4 cores @ 3.5 GHz base, overclocked to . . . with 16 GB of DDR3 . . . MHz RAM.

Performance of MATLAB Clustering Algorithms

45

4. The processor above with Nvidia GTX 660, 960 CUDA cores & 2 GB of VRAM. 5. Intel core i7-8750h, 6 cores @ 2.2 GHz base and 16 GB of DDR4 . . . MHz RAM. 6. The processor above with Nvidia GTX 1070 (mobile), 2048 CUDA cores and 8 GB of VRAM. 7. AMD Ryzen 3700U, 4 cores @ 2.3 GHz base and 6 (effectively) GB of RAM. For GPUs to be utilized, the Parallel Toolbox in MATLAB is installed. The dataset is NIPS Conference Papers 1987–2015 from UCI Machine Learning Repository [7]. Papers are referenced by “Vision”, “Neural” and “Learning” values. All clustering algorithms use squared Euclidean distance as a metric:  2 2 (ai − bi ) (1) |a − b|2 = i

4

CPU Benchmark

The benchmark reads the dataset (transposed and optimized, available at [12]). k-Means, DBSCAN, hierarchy and nearest-neighbors clustering algorithms’ implementations are run 500 times, with each iteration starting with setting timer with tic function and ending with reading time spent on iteration with toc function call. The data is then collected into an array (for each algorithm). The mean and sample standard deviation is calculated (Fig. 1 and Table 1): t=    s=

N 1  ti N i=1

2 1  ti − t N − 1 i=1

(2)

N

(3)

Since, probably, clustering will be performed once, first run results have been recorded as well (Fig. 2). MATLAB can plot the results of clustering, so we can view the results in a more comprehensible format (Fig. 3). Results of hierarchy clustering is usually represented by a dendrogram. The higher the level of a class on it, the broader it is (Figs. 4, 5 and 6).

3700u

8750h

0.031593 0.01869 0.135808 0.015145

0.986554 0.069673

0.197224 0.10638

my dbscan 0.2443005 0.0141887 0.3879294 0.1941701 0.0228209 0.5046445 0.1049712 0.0118161 0.1969

0.6148698 0.0583684 0.9526

Neighbors 0.0240679 0.1134024 0.1685378 0.0428162 0.0239203 0.5702964 0.0268133 0.0119936 0.1322

3.366557

0.6195843 0.1145432 0.7813761 1.005445

0.351111

3770k

0.455906

0.23805

1.412833

0.302635

Deviation First run Average Deviation First run

0.1485647 0.0294064 0.1733067 0.2369192 0.3332865 7.6030114 0.1607835 0.0688289 0.1874

Deviation First run Average

Hierarchy

Deviation First run Average

k means

Average

Algorithm 3900x

Table 1. CPU-only benchmark

46 A. Ivanov et al.

Performance of MATLAB Clustering Algorithms

Fig. 1. CPU-only benchmark (average), lower – better

Fig. 2. CPU-only benchmark (first run), lower – better

47

48

A. Ivanov et al.

Fig. 3. k-means clustering

Fig. 4. Hierarchy clustering

Performance of MATLAB Clustering Algorithms

49

Fig. 5. Nearest-neighbor clustering

Fig. 6. DBSCAN clustering

5

GPU Benchmark

This benchmark uses the same dataset, as the one above. It only differs from the previous by utilizing GPUs. Parallel computing option is specified for k-means, so that the GPU is used for computing [8]. Also, ‘IncludeTies’, ‘NSMethod’, and ‘SortIndices’ name-value pair arguments are not used for knnsearch function [9], ‘squaredeuclidean’ Distance argument is supplied to pdist function for the same reason [10] (Fig. 7 and Table 2).

Deviation

First run

Average

660 Deviation

3770k

0.165918617 0.012611378 0.34114

my dbscan 0.090224443 0.008407704 0.2682983 0.137256744 0.008500473 0.3158782

0.135808 0.015145

0.043220559 0.021544788 0.521507 0.031593 0.01869

0.598769451 0.089768183 2.596127 0.986554 0.069673

Neighbors 0.029876952 0.010741517 0.2659459 0.038634962 0.014030987 0.3483474

0.539515566 0.044483149 1.4714957

0.455906

0.23805

1.412833

0.302635

First run Average Deviation First run

0.304797988 0.012092614 0.471679

Average

1070 mobile

0.101600341 0.022818093 0.3723852 0.193905003 0.559473012 12.6737349 0.263266735 1.013714704 22.88024 0.197224 0.10638

First run

Hierarchy

Deviation

k means

Average

Algorithm 2080ti

Table 2. GPU benchmark

50 A. Ivanov et al.

Performance of MATLAB Clustering Algorithms

51

Fig. 7. GPU performance (average), lower – better

GPUs perform much better than CPUs in such tasks because of their architecture: they can perform the same step on different data in one tick (known as single instruction, multiple data, SIMD) (Fig. 8). Nevertheless, data that is to be analyzed, must get from RAM to VRAM and that takes some time. That’s why first run results are rather poor (especially noticeable for k-means algorithm) (Fig. 9).

Fig. 8. GPU benchmark (first run), lower – better

52

A. Ivanov et al.

Fig. 9. k-means clustering

Results of k-means clustering performed on GPUs does not differ from results acquired on CPUs, which means that it is consistent (Fig. 10).

Fig. 10. Hierarchy clustering

Same for hierarchy clustering (Fig. 11). Dissimilarities have been found during comparison of GPU and CPU results (only on the Nvidia RTX 2080ti). This may be due to mixed-precision architecture of GPU calculations (Fig. 12).

Performance of MATLAB Clustering Algorithms

53

Fig. 11. Nearest-neighbor clustering

Fig. 12. DBSCAN clustering

6

Performance per Ruble

Performance in this section is defined as number of clustering function invocations per second, as in the formula: P =

1 , t

(4)

54

A. Ivanov et al.

where P is performance (the higher the better), t is time, in seconds (Fig. 13 and Table 3). Table 3. Average performance Algorithm 3900x 3700u 8750h 3770k 2080ti 1070 mobile 660 k means

6.731 4.221 6.2195 5.07

Hierarchy

1.614 0.995 1.2272 1.014 3.2809 1.85351464

Neighbors

41.55 23.36 37.295 31.65 33.471 25.88329193 23.13714

my dbscan 4.093 5.15

9.8425 5.157164522 3.798429

9.5264 7.363 11.083 7.28561653

1.670092 6.027051

Fig. 13. Iterations of algorithm in a second on specified hardware

Performance per ruble, therefore, is performance divided by the price (CPU + RAM/ CPU + RAM + GPU/Laptop [i7-8750h & GTX 1070, AMD 3700U]) (Fig. 14, Tables 4 and 5): Table 4. Price of hardware Price

3900x 3700u 8750h

3770k 2080ti

1070 mobile 660

Rubles 51640 41400 117000 25027 143540 117000

39046.84

Performance of MATLAB Clustering Algorithms

55

Table 5. Performance/ruble Algorithm 3900x k means

3700u

8750h

3770k

2080ti

1070 mobile 660

0.000130346 0.000101953 5.31585E-05 0.000202596 6.85696E-05 4.40783E-05 9.72788E-05

Hierarchy 3.12546E-05 2.40238E-05 1.04888E-05 4.05014E-05 2.28568E-05 1.5842E-05 Neighbors 0.000804591 0.000564146 0.00031876

0.001264746 0.00023318

4.27715E-05

0.000221225 0.000592548

my dbscan 7.92665E-05 0.000124399 8.14224E-05 0.000294217 7.72152E-05 6.22702E-05 0.000154354

Fig. 14. Average performance/ruble of hardware

7

Conclusion

GPUs are usually considered much better in mathematical calculations because of their core count – they can perform way many more operations than most CPUs. Nevertheless, there is always a time lag for data synchronization – it must get from cache/RAM into VRAM and GPU’s cache in order to be processed. Even though modern expansion card buses (PCIe 3.0 × 16) offer speeds of up to 16 GB/s, the transfer still takes some time, that is why first run on GPU takes more time than on the CPU. The most powerful piece of hardware, the Nvidia RTX 2080ti, outperformed almost all other pieces of equipment, as expected, although the AMD Ryzen 9 3900X can run 7 more iterations of the nearest neighbor clustering method that the graphics card. The best performance per ruble is delivered by Intel core i7-3770k, which is still a quite capable processor, despite its age. Also, being unlocked, it may be overclocked in order to improve its capabilities. However, the possibility and the extent of that depends on the quality of the die, in some cases higher potential may be achieved. CPUonly test has shown that the algorithms are more subject to single core performance, rather than core count. The parallel toolbox can unlock the processor’s

56

A. Ivanov et al.

and the graphics card’ potential by employing more threads on more cores. The CUDA hardware version also determines the performance of the GPU – fused multiply and add as well as mixed precision calculations give additional boost to its efficiency. The amount of RAM and VRAM can limit the effectiveness of an algorithm. It is usually stated that about 4 times more memory is required in order to perform a machine learning task that the size of the dataset.

References 1. Babichev, S., Lytvynenko, V., Taif, M.A.: Estimation of the inductive model of objects clustering stability based on the k-means algorithm for different levels of data noise. Radio Electron. Comput. Sci. Manage. 4(39), 54–60 (2016). https:// doi.org/10.15588/1607-3274-2016-4-7 2. MacKay, D.: An example inference task: clustering. In: Information Theory, Inference and Learning Algorithms, pp. 284–292. Cambridge University Press, Cambridge (2003). ISBN 978-0-521-64298-9. MR 2012999 3. Choose Cluster Analysis Method. (n.d.) Retrieved 5/13/2020 from MATLAB & Simulink. https://www.mathworks.com/help/stats/choose-cluster-analysismethod.html 4. Nielsen, F.: Hierarchical clustering. Introduction to HPC with MPI for Data Science. Undergraduate Topics in Computer Science, pp. 195–211. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-21903-5 8 5. Cover, T.M., Hart, P.E.: Nearest neighbor pattern classification (PDF). IEEE Trans. Inf. Theor. 13(1), 21–27 (1967). https://doi.org/10.1109/TIT.1967.1053964 6. Ester, M., Kriegel, H.-P., Sander, J., Xu, X.: A density-based algorithm for discovering clusters in large spatial databases with noise. In: Simoudis, E., Han, J., Fayyad, U.M. (eds.) Proceedings of the Second International Conference on Knowledge Discovery and Data Mining (KDD-96). AAAI Press, pp. 226–231 (1996). ArXiv:10.1.1.121.9220. ISBN 1-57735-004-9 7. Perrone, V., Jenkins, P.A., Spano, D., Teh, Y.W.: Poisson Random Fields for Dynamic Feature Models (2016). arXiv:1611.07460 8. k-means clustering - MATLAB kmeans (n.d.) Retrieved 5/13/2020 from MathWorks Help Center (2020). https://www.mathworks.com/help/stats/kmeans.html 9. Find k-nearest neighbors using input data - MATLAB knnsearch (n.d.) Retrieved 5/13/2020 from MathWorks Help Center (2020). https://www.mathworks.com/ help/stats/knnsearch.html 10. Pairwise distance between pairs of observations - MATLAB pdist (n.d.) Retrieved 5/13/2020 from MathWorks Help Center (2020). https://www.mathworks.com/ help/stats/pdist.html 11. Measure the Performance of Your Code - MATLAB & Simulink (n.d.) Retrieved 5/13/2020 from MathWorks Help Center (2020). https://www.mathworks.com/ help/matlab/matlab prog/measure-performance-of-your-program.html 12. https://github.com/berkut126/MatlabPerformance/blob/master/NIPS.csv (2020)

High-Capacity Photon Switching Systems Based on the Two-Stage 256 × 256 Switch E. A. Barabanova1,2(B) , K. A. Vytovtov1,2 , V. S. Podlazov1 , and V. M. Vishnevsky1 1 2

V.A. Trapeznikov Institute of Control Sciences RAS, Profsoyuznaya 65 str., Moscow, Russia Astrakhan State Technical University, Tatischeva 16 str., Astrakhan, Russia [email protected] Abstract. The new type of high-capacity photon switching systems based on the two-stage 256 × 256 switch are proposed in this work for the first time. The main advantage of this type of photon systems is the constant period between optical signals that required for non-blocking property of the switch. This period is equal to four bits for the systems with any number of inputs. The method of invariant scaling of photon switching systems based on the two-stage 256 × 256 switch is offered for the first time also. It provides non-blocking of the switching scheme and the constant period between optical signals. Additionally the method of circuit and fiber complexities calculation of the proposed high-capacity photon switching systems is developed in this work for the first time. The numerical calculations of the circuit and fiber complexities and comparison with the crossbar and tree-type switching systems are carried out. The results show the gain in circuit complexity of the presented schemes in comparison with the strictly non-blocking crossbar scheme and the gain in fiber complexity in comparison with the tree-type one. Keywords: Photon switch · Two-stage switch Demultiplexer · Complexity

1

· Multiplexer ·

Introduction

Today, stream data processing technology is widely used in electronics, optoelectronic and all-optical “Big data” processing systems [1,2]. Parallel data processing switches with the large number of inputs should be used in such systems for high performance interconnections [3]. Electronic and optoelectronic switching systems with the large number of inputs has been widely described in literature [4,5]. As for all-optical switching systems, there are only small capacity switches based on well-known crossbar, Banyan or schemes [6,7] as rule. Recently, the new type of all-optical high-capacity strictly non-blocking switching systems has been presented by the authors in [8–10]. The main element of those photon switching systems is the 4 × 4 photon switch [10]. Next, the 16 × 16 switching The reported study was funded by RFBR, project number 19-29-06043. c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 57–69, 2020. https://doi.org/10.1007/978-3-030-66242-4_5

58

E. A. Barabanova et al.

system is based on these 4×4 photon switches has been presented [8]. One of the advantages of those systems is the low complexity which is approximately equal to one of blocking schemes [7]. However, their throughput is linearly decreased with increasing in the number of inputs. Indeed in this case the period T that necessary for strictly non-blocking functioning must be increased. For example, this period is equal to four bits (T = 4) for the 4 × 4 switching system, it is equal to sixteen (T = 16) for the 16 × 16 switching system, and T = 49 for the non-blocking functioning 256 × 256 one. Thus we can say that the throughput of the 256 × 256 switching system is 12 times less than the throughput of the 4 × 4 switching system and 3 times less than the throughput of the 16 × 16 one. This paper is devoted to developing the design principles of non-blocking highcapacity switches. First of all we propose the new type of the 256 × 256 base element (Sect. 3) allowing us to design the strictly non-blocking high-capacity photon switching systems. Actually, it is the complex multi-stage scheme contains the new quasi-complete photon 16 × 16 switches with constant period T = 4 (Sect. 2). Such the approach allows us to design, describe, and calculate arbitrary high-capacity switching systems with constant period T = 4 from the same point of view. It also is offered the method of the switch scaling (Sect. 4), and the new complexity calculation method (Sect. 5).

2

The Quasi-Complete Photon 16 × 16 Switch

In this section we present the new scheme of the 16 × 16 switch (Fig. 1) that is used as the cell of the 256 × 256 base element (Fig. 2). Note as the advantage that the period T of the offered 16 × 16 quasi-complete photon cell is 4 times smaller then the one of the 16×16 switch described in [8]. At the same time, high throughput of the new type of switch is achieved by increasing circuit complexity in six time in comparison with the photon one [10]. The 16 × 16 cell is based on the sixteen 4 × 4 photon switches in the central stage, the sixteen 1 × 4 photon demultiplexers in the input stage and the sixteen 4 × 1 photon multiplexers in the output stage(Fig. 1). These elements connect to each other in accordance to the quasi-complete graph principal [11]. For this purpose all input 1×4 photon demultiplexers are divided into four groups of four 1×4 photon demultiplexers. And all central 4×4 photon switches are divided into four groups of four 4 × 4 photon switches also. The input demultiplexers of each group are connected with the central stage photon switches of the corresponding group in accordance with the tree-type topology [7]. The central stage photon switches are connected with the output 4 × 1 photon multiplexers in accordance with the following rule: the outputs of the first photon switch are connected with the inputs of the next numbers of output 4 × 1 photon multiplexers: 1, 5, 9 and 13; the outputs of the second photon switch are connected with the inputs of the next numbers of output 4 × 1 photon multiplexers: 2, 6, 10 and 14,..., the outputs of the fourth photon switch are connected with the inputs of the numbers of multiplexers: 4, 8, 12 and 16. Analogously for the fifth-eighth photon switches it can be written the following sequence of the output multiplexer numbers: 5,

High-Capacity Photon Switching Systems

59

9, 13, 1; 6, 10, 14, 2; ... 8, 12, 16, 4. Finally for the ninth-thirteenth photon switches and for fourteens-sixteenth ones the sequence of the output multiplexer numbers will be following: 9, 13, 1, 5;...12, 16, 4, 9; and 13, 1, 5, 9;...16, 4, 8, 12. The quasi-complete graph principal provides the strictly non-blocking of the switching system and does not increase the period of optical signals with an increase in the number of inputs.

Fig. 1. The design of photon quasi-complete 16 × 16 switch

3

The Two-Stage Photon 256 × 256 Switch as the Basic Element of High-Capacity Photon Switching Systems

The proposed 256 × 256 base element consists of the two stages of the quasicomplete photon 16 × 16 cells (Fig. 2). Here N1 = 16 is the number of the inputs of the 16×16 switch, N2 = 256 is the number of the inputs of the 256×256 switch, the trapezoids C2,1 denote the 16×16 switch schemes (Fig. 1) without the output multiplexers, the squares C2,2 denote the schemes of the complete switches with the N1 = 16 inputs and the N1 = 16 outputs (Fig. 1). The triangles C2,3 denote the schemes of the 4 × 1 multiplexers. The set C1 = {1...1024} corresponds to the outputs of the circuits C2,1 and consists of three subsets I, J, k, where the elements of the subset I = {1...16} are numbers of the circuits C2,1 , the elements of the subsets J = {1...16} are the groups numbers of the four outputs of the

60

E. A. Barabanova et al.

circuits C2,1 , and the elements of the subset k ={1...4} are the output numbers in the groups. It also is seen in Fig. 2 that there are the p = 4 copies of the sets C2 = {1...256}. Each set C2 corresponds to the inputs of the circuits C2,2 . It consists of the subsets I and J, where the elements of the subsets I = {1...16} are numbers of the circuits C2,2 , and the elements of the subsets J = {1...N1 } are the input numbers of the circuits C2,2 . There are interconnections between the outputs of the circuits C2,1 and the inputs of the circuits C2,2 in each of the four copies of C2 . Here the outputs I, J, k are connected to the inputs J, I of the k-th copy of the sets C2 . The outputs of the k copy of the set C2 are combined by the 4 × 1 multiplexers circuits into the outputs of 256 × 256 switch.

4

The Method of Invariant Scaling of Photon Switching Systems

Now let us apply the method of invariant scaling of system networks based on the principal of quasi-complete graph for increasing the capacity of the proposed switches [10]. However this method is applied for these systems here for the first time, and it allows us to increase the number of the inputs without increasing the period T between signals. As example, here we consider the design of the 1024 × 1024 switch based on the 256 × 256 elements. In according to this method the 1024 × 1024 switch contains the sixteen 256 × 256 two-stage switches in the central stage, the one thousand and twenty-four 1 × 4 input demultiplexers in the input stage and the one thousand and twenty-four 4 × 1 output multiplexers in the output stage (Fig. 3). Therefore the central stage has the 4096 inputs (outputs), the input stage has the 1024 inputs and the 4096 outputs, the output stage has the 4096 inputs and the 1024 outputs. Thus the considered structure is analogous to the quasi-complete photon 16 × 16 switch containing three stages (Fig. 1). According to the principal of the quasi-complete graph, each of the sixteen 256 × 256 switches is divided into the sixty-four zones containing the four inputs. Every two hundred and fifty-six inputs of the 1024 × 1024 switch are connected with the inputs of the central stage zones through the 1×4 input demultiplexers analogous to the quasi-complete photon 16 × 16 scheme (Fig. 1). And the sixty-four outputs of the zones must be connected with the 1024 × 1024 system outputs through the 4 × 1 multiplexers, analogous to the outputs of the central stage of the 16 × 16 switch connect with the 4 × 1 multiplexers (Fig. 4). In such the switch the signal from any input transmits to one of the copies of the 256 × 256 switch. Therefore, the 1024×1024 switch is non-blocking as well as the 256×256 one. The analogous principal can be used for next scaling of photon switches for designing 4096 × 4096,16384 × 16384, 65536 × 65536 photon switches etc.

High-Capacity Photon Switching Systems

Fig. 2. The design of two-stage photon 256 × 256 switch

61

62

5 5.1

E. A. Barabanova et al.

Complexity Calculation Circuit Complexity

First, let us find the circuit complexity of two-stage 256 × 256 switch (Fig. 2) which is the basic element of the proposed switching systems. Here we assume that the circuit complexity of each multiplexers and demultiplexers is equal to unit and the circuit complexity of each 4 × 4 photon switch is equal to four [10]. Here the first stage of the switch consists of the two hundred and fifty-six 1 × 4 demultiplexers and the two hundred and fifty-six 4 × 4 photon switches and the second stage consists of the four groups of the sixteen 16 × 16 switches. And also the two hundred and fifty-six 4×1-multiplexers are installed on the output of the system. Taking into account the above description we can write the expression for calculating the complexity of the basic element of the proposed switching system as S256 = 256 + 4 · 256 + 4 · 16 · (16 + 4 · 16 + 16) + 256 = 7680

(1)

To use the principle of expansion of the photon switching systems based on the two-stage 256 × 256 switch we can write the equations for complexities S1024 , Central stage

... ...

64

1

1

64

...

64

...

1 ...

...

64

9

...

1

256

256

1 ...

64

13

...

...

1 ...

1

64 256

5

...

256

13 1

16 1

2

1

4 1024

64

1

1

...

... 4 1

64

...

256 3

256

769

1

...

...

256

4 ...

1

1

...

256

1 2

...

1 ...

1

...

DMUX 1х4

MUX 4х11

64

1 64

Input stage 1

Output stage 1

1

16 1024

256

Fig. 3. The design of photon quasi-complete 1024 × 1024 switch

High-Capacity Photon Switching Systems

63

S4096 , S16384 , S65536 of the 1024×1024, 4096×4096, 16384×16384, 65536×65536 switches correspondingly: S1024 = 16 · S256 + 2N · 40 = 124928

(2)

S4096 = 162 · S256 + 41 · 2N + 2N · 40 = 2007040

(3)

S16384 = 163 · S256 + 42 · 2N + 41 · 2N + 2N · 40 = 32145408

(4)

S65536 = 16 · S256 + 4 · 2N + 4 · 2N + 4 · 2N + 2N · 4 = 514457600 4

3

2

1

0

(5)

Based on this regularity (3)–(5) and the method of mathematical induction, the formula for calculating the complexity of the proposed photon switches for any N inputs can be obtained in the following form Sn = 16n · S256 + 4n−1 · 2N + 4n−2 · 2N + ... n−1  4i + 41 · 2N + 40 · 2N = 16n · S256 + 2N

(6)

i=0

where n is the circuit serial number which is associated with the number of the inputs as (7) N = 22n+8 Expressing n from (7) we get n = log2



N −4

(8)

The results of numerical calculations are presented in Table 1. Taking into account the fact that S256 = 7680 and inserting (8) in (6) we get the final expression for calculating the complexity of the proposed photon switching systems √ log2 N −5  15 2 S(N ) = N + 2N 22i (9) 128 i=0 for the case N > 256. And since (1) we have S(N ) = 7680 for N = 256. Therefore it can be written finally ⎧ 7680 for N = 256 ⎪ √ ⎨ log2 N −5  S(N ) = (10) 15 2 ⎪ 22i for N > 256 ⎩ 128 N + 2N i=0

5.2

Fiber Complexity

Fiber complexity is the total number of fibers required for connecting each input with each output through the switching elements. First of all let us calculate the fiber complexity of the 256× 256 two-stage switch, and then the fiber complexity of N × N switch with arbitrary N . As the 256 × 256 two-stage switch, consists

64

E. A. Barabanova et al.

Table 1. The values of the circuit complexity of the high-capacity photon switching systems based on the two-stage 256 × 256 switch for the different number of inputs n N

S(N )

n N

0 28 = 256 10

1 2

= 1024

124928 6 2

2 212 = 4096 14

3 2

S(N )

7680 5 218 = 262144

= 16384

20

8231845888

= 1048576 131711631400

2007040

...

32145408

...

4 216 = 65536 514457600 n 22n+8

S(22n+8 )

of the two stages of the quasi-complete photon 16 × 16 cells we must calculate internal fiber lines inside each switching cell and external fiber lines between stages. The 16 × 16 cell without the output multiplexers of the input stage contains 16 × 4 = 64 internal fibers (Fig. 1) and each complete the 16 × 16 cell of the second stage contains 2 × 16 × 4 = 128 internal fibers. Also there are 16 × 4 × 16 = 1024 external fiber lines between the first and the second stages and there are 16 × 4 × 16 = 1024 external fiber lines between the second and the third stages. (Fig. 1) So the expression for calculating the fiber complexity of the 256×256 two-stage switch is F (256) = 64×16+128×16×4+1024+1024 = 11264. Considering the method of invariant scaling of photon switching systems (Sect. 4) we can calculate the fiber complexity F (1024), F (4096), F (16384), F (65536) of the proposed schemes for 1024, 4096, 16384, 65536 inputs correspondingly F (1024) = 8 × 1024 + 16 × 11264 = 188416

(11)

F (4096) = 8 × 4096 + 16 × 188416 = 3047424

(12)

F (16384) = 8 × 16384 + 16 × 3047424 = 48889856

(13)

F (65536) = 8 × 65536 + 16 × 48889856 = 782761984

(14)

And analogously, for N number of inputs we can write F (N ) = 8 × N + 16 × F (N/4)

(15)

Now let us write the expressions (10)–(14) as F1 = F (210 ) = 8N + 24 · F256 = 188416 F2 = F (2 ) = 8N + 2 12

F3 = F (2 ) = 8N + 2 14

19

F4 = F (2 ) = 8N + 2 16

+ 2 · F256 = 3047424

17

21

8

21

12

+2

+2

23

25

+2

+2

· F256 = 48889856 16

+2

· F256 = 78761984

(16) (17) (18) (19)

In general case for n-number scheme we obtain Fn = F (22n+8 ) = 8N + 217

n  i=0

22(i+n−4) − 22n+11 − 22n+9 + 24n · 11264 (20)

High-Capacity Photon Switching Systems

65

Substituting (8) into expression (20) we obtain the resulting expression of the fiber complexity for high-capacity photon switches based on the 256 × 256 twostage switch for the first time ⎤ ⎡ √ log2 N −4  11 (21) F (N ) = N ⎣ 22i+1 − 2 + N ⎦ 64 i=0 The results of numerical calculations are presented in Table 2. The results are equal to the ones obtained in simple recalculation of the fiber connections in the corresponding schemes. Table 2. The values of the fiber complexity of the high-capacity photon switching systems based on the two-stage 256 × 256 switch for the different number of inputs n N 8

0 2 = 256 1 210 = 1024

F (N )

n N

11264 5 2

18

F (N ) = 262144

2 212 = 4096

3047424

...

3 214 = 16384

48889856

...

4 216 = 65536 782761984 n 22n+8

6

12526288900

188416 6 220 = 1048576 200429011000

F (22n+8 )

The Comparative Analysis

At first, we present the comparative analysis results of the circuit complexities of the three switch type: the crossbar switch [7], the photon switches [8–10] and the new type of high-capacity switching systems (Fig. 4). The calculation results show that the circuit complexity of the new type of the high-capacity switching systems is more than the complexity of the photon switches [8,10] and significantly less than the complexity of the crossbar ones [5]. For example, the circuit complexity of crossbar switch [7] with the input number N = 4096 is Sc (N ) = N 2 = 16777216; the circuit complexity of the photon switch [6] is Sd (N ) = N/2 · log2 N = 24576 and the circuit complexity of the proposed high-capacity photon switch is equal to 2007040. Thus, in this case the circuit complexity of the proposed type of photon switches in 82 times more than the complexity of the photon switches [6] and in 8 times less than the complexity of crossbar switches [5]. Now we present the comparative analysis results of the fiber complexities of the three switch type: the tree-type switch [7], the photon switches [8,10] and the new type of high-capacity switching systems. As the fiber complexity of photon switches [10] has not been calculated earlier we present derivation of its formula for the first time also. From the design of the photon switches [5]

66

E. A. Barabanova et al.

Fig. 4. The comparison of the circuit complexity. The solid line corresponds to the photon switching system based on two-stage 256 × 256 switch, the long-dash line corresponds to the crossbar switch, the dash-dot line corresponds to the photon switch

it follows that the fiber complexity of the 16 × 16, 256 × 256, 65536 × 65536 and 4294967296 × 4294967296 photon switches can be calculated by using the expressions: (22) Fd0 = F (24 ) = F (16) = 4 · 4 = 16 Fd1 = F (28 ) = F (256) = N + 2 · 16 · Fd0 = 256 + 2 · 16 · 16 = 768

(23)

Fd2 = F (2 ) = F (65536) = N + 2 · 256 · Fd1 = 65536 + 512 · 768 = 458752 (24) 16

Fd3 = F (232 ) = F (4294967296) = N + 2 · 65536 · Fd2 = 4294967296 + 2 · 65536 · 458752 = 64424509440

(25)

Let us write the expressions (22)–(25) in the form: Fd0 = F (24 ) = 24 · 20 = 16

(26)

Fd1 = F (28 ) = 28 + 29 = 28 · (20 + 21 ) = 768

(27)

Fd2 = F (216 ) = 216 + 2 · 28 · (28 + 29 ) = 216 + 217 + 218 = 216 · (20 + 21 + 22 ) = 458752

(28)

Fd3 = F (232 ) = 232 + 2 · 216 · (216 + 217 + 218 ) = 232 + 233 + 234 + 235 = 232 · (20 + 21 + 22 + 23 ) = 64424509440

(29)

where Fd0 is the fiber complexity of 256 × 256 switch, Fd1 is the fiber complexity of 1024 × 1024 switch, etc. After analyzing the above dependences, we write down the expression n−1  Fd (N ) = N 2i (30) i=0

High-Capacity Photon Switching Systems

67

for the N × N fiber complexity of the photon switch. Here n is the serial number of the scheme (31) n = log2 log2 N − 1 The numerical calculation results (Fig. 5) show that the fiber complexity of the new type of the high-capacity switching systems is more than the fiber complexity of the photon switches [6] and significantly less than the complexity of the tree-type ones [5]. For example, the fiber complexity of the tree-type switch [5] with the input number N = 65536 is Ft (N ) = N 2 = 4294967296; the fiber complexity of the photon switch is (30) Fd = 458752 and the fiber complexity of the proposed high-capacity photon switch is equal to 782761984. Thus in this case the fiber complexity of the proposed type of photon switches in 1706 times more than the complexity of the photon switches [6] and in 5.5 times less than the complexity of tree-type switches [5]. Significantly lower circuit and fiber complexities are the advantages of the proposed high-capacity switches in comparison with the tree-type scheme, and in comparison with the photon switches, the proposed systems have higher throughput. Increasing the throughput of the proposed schemes is provided by the decreasing a period of signals. A period of signals for proposed switches is in 4 times less than the period of the 16 × 16 systems and in 12 times less than the period of the 256 × 256 photon systems [10].

Fig. 5. The comparison of the fiber complexity. The solid line corresponds to the photon switching system based on two-stage 256 × 256 switch, the long-dash line corresponds to the tree-type switch, the dash-dot line corresponds to the photon switch

68

7

E. A. Barabanova et al.

Conclusion

In this paper the new type of high-capacity photon switching systems based on the two-stage switch 256 × 256 is presented for the first time. The designing principals of such the 256 × 256 element are described in detail by using the set-theoretic representation of the switch. The method of invariant scaling of the proposed photon switching systems is considered also. As the example the 1024 × 1024 system bipartite graph is presented and described in detail. The main advantages of the proposed systems are strictly non-blocking, scalability, low circuit and fiber complexities in comparison with strictly non-blocking cross-bar and tree-type switches [5], and high throughput in comparison with the photon switches [6]. The throughput of the proposed switches is in 4 times higher than the throughput of the 16×16 photon switching systems [10] and in 12 times higher than the throughput of 256 × 256 ones. The analytical models for calculating the circuit and fiber complexities of the proposed switching systems are presented here for the first time. The numerical calculations showed that the difference in the circuit and fiber complexities of the crossbar and tree-type switches and the proposed switching systems increases with the increase in the number of inputs.

References 1. Mohamed S.H., El-Gorashi, T.E.H., Elmirghani, J.M.H.: A survey of big data machine learning applications optimization in cloud data centers and networks. Netw. Internet Archit. (2020). https://arxiv.org/ftp/arxiv/papers/1910/ 1910.00731.pdf 2. Parygin, D.S., Malikov, V.P., Golubev, A.V., Sadovnikova, N.P., Petrova, T.M., Finogeev, A.G. Categorical data processing for real estate objects valuation using statistical analysis. J. Phys. Conf. Ser. Proc. Int. Conf. Inf. Technol. Bus. Ind. 1015, 032102 (2018). pp. 1–6, Russia, 18–20 January 2018. IOP Publishing (2018) 3. Barabanov, I., Barabanova, E., Maltseva, N., Kvyatkovskaya, I.: Data processing algorithm for parallel computing. Commun. Comput. Inf. Sci. 466, 61–69 (2014) 4. Qiao, L., Tang, W., Chu, T.: 32 × 32 silicon electro-optic switch with built-in monitors and balanced-status units. Sci. Rep. 7, 42306 (2017) 5. Kutuzov, D., Osovsky, A., Stukach, O., Starov, D.: CPN-based model of parallel matrix switchboard. In: 2018 Moscow Workshop on Electronic and Networking Technologies (MWENT). Proceedings. - Moscow: National Research University “Higher School of Economics” Russia.- Moscow, March 14–16 (2018). https://doi. org/10.1109/MWENT.2018.8337180 6. Seok, T.J., Kwon, K., Henriksson, J., Luo, J., Wu, M.C.: Wafer-scale silicon photonic switches beyond die size limit. Optica 6(4), 490–494 (2019) 7. Kabacinski, W.: Nonblocking Electronic and Photonic Switching Fabrics, p. 282. Springer, USA (2005) 8. Barabanova, E.A., Vytovtov, K.A., Maltseva, N.S., Kravchenko, O.V., Kravchenko, V.F.: Models and algorithms of optical switching systems with decentralized control. In: 2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, pp. 64–68 (2019). https://doi.org/10.1109/EIConRus. 2019.8657063

High-Capacity Photon Switching Systems

69

9. Vytovtov, K.A., Barabanova, E.A.: Optical switching cell based on metamaterials and ferrite Films. In: 12th International Congress on Artificial Materials for Novel Wave Phenomena - Metamaterials 2018 Espoo, Finland, Aug. 27th–Sept. 1st. 2018, pp. 424–426 10. Barabanova, E.A., Vytovtov, K.A., Vishnevskiy, V.M.: Novyj princip postroeniya opticheskih ustrojstv obrabotki informacii dlya informacionno-izmeritel’nyh sistem. Datchiki i sistemy 9, 3–9 (2019, in Russian) 11. Karavai, M.F., Parkhomenko, P.P., Podlazov, V.S.: Combinatorial methods for constructing bipartite uniform minimal quasicomplete graphs (symmetrical block designs). Autom. Remote Control 30, 312–327 (2009). Pleiades Publishing, Ltd

Investigation of the Guaranteed Traffic Rate in Enterprise WLAN M. Rudenkova , H. Khayou , and L. I. Abrosimov(B) National Research University “Moscow Power Engineering Institute”, Krasnokazarmennaya 14, 111250 Moscow, Russia {RudenkovaMA,AbrosimovLI}@mpei.ru, [email protected]

Abstract. Enterprise WLAN uses an IEEE 802.11 wireless channel to transfer data from a variety of network applications. The predominant types of traffic are the various types of real-time traffic that currently play an important role in business operations. Network applications with real-time traffic have different network requirements: packet bandwidth, jitter, packet delay, and loss tolerance. WLANs have variable packet throughput depending on the bandwidth, the number of connected wireless stations, the traffic intensity of the network applications, and completely different media access protocols. Real-time traffic creates challenges and demands on wireless resource management. The purpose of this paper is to improve end-user experience of real-time traffic transmission through the wireless channel. To achieve this goal, we developed a testbed to obtain the mean and variance of wireless channel service time using event-driven simulator. We also proposed an analytical model of enterprise WLAN and equations to compute the guaranteed traffic intensity through wireless channel. An example showing how to obtain the guaranteed traffic intensity using the analytical model and event-driven simulation results is provided.

Keywords: WLAN

1

· Performance · DCF · PCF

Introduction

Wireless local area network (WLAN) is the most popular technology for providing access to local services or/and Internet services in the enterprise. Recently, various types of voice and video network applications, such as real-time interactive video applications, streaming video, telepresense and video conference applications are becoming increasingly important to the enterprise. Real-time traffic requires guaranteed delivery time of network packet. Wireless channel media access protocols provide: mechanism to place one network packet in the wireless medium (contention or contention-free protocol), delivery control and network packet acknowledgment. If the network packet is placed in the wireless medium without collision, the wireless channel deliver c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 70–81, 2020. https://doi.org/10.1007/978-3-030-66242-4_6

Investigation of the Guaranteed Traffic Rate in Enterprise WLAN

71

this packet to the receiver. When the intensity of real-time traffic increases, the wireless channel queue increases and delivery time also increases. If the waiting time is greater than the guaranteed delivery time, the packet is removed from queue and dropped. The guaranteed traffic rate is one of the criteria for QoS estimation [1]. The fundamental purpose of QoS is to provide the required level of service in current network conditions. The basic characteristics of QoS are bitrate, jitter, packet delay and loss tolerance. But for real-time traffic the more important is End-toend QoS [2] which is very difficult to estimate. There is a problem in determining the numerical characteristics of End-toEnd QoS especially the packet delivery rate or the actual time to service the network packet (delay) which depend on the following: wireless channel throughput, number of connected wireless stations, intensity of inbound traffic, wireless channel media access protocol and its parameters. There are many publications on estimating the delay, throughput or performance of the IEEE 802.11 wireless channel for a set of configuration parameters and WLAN characteristics [3–7]. The authors developed M/M/1/∞ [3–5] or M/G/1/∞ [6,7] model for WLAN, which is unsuitable for real-time traffic in enterprise WLAN. The authors of [8] [9] examine the performance and delay of the wireless channel for a set of configuration parameters and different WLAN characteristics, but it is very important to develop a methodology to obtain guaranteed traffic intensity for enterprise WLAN specificity. Therefore, we developed an event-driven simulation testbed to obtain the wireless channel service time and the variance for a set of WLAN parameters and characteristics. We modified M/G/1/s model to describe the enterprise WLAN model and obtain the equations to compute the wireless channel actual service time to service real-time traffic, the guaranteed delivery rate and the wireless channel efficiency of packet delivery. We proposed a methodology and an example to compute the guaranteed delivery rate for the specified guaranteed delivery time of real-time network application.

2

Characteristics of Wireless Local Area Network

We study enterprise WLAN in infrastructure mode which contains an access point AP, wireless stations STA (k = 1, K) and an internal corporate LAN as Switch and corporate LAN resources as Server (Fig. 1). Each STA has its own set of real-time network applications. AP has a IEEE 802.11 wireless channel with media access control protocol CF (CF = [DCF, P CF ]). The WLAN under study has the following characteristics. The real-time network applications utilize the wireless channel by sending packets with an average length l [bit/packet]. The intensity of real-time network application traffic determines the time between network packets θk which is assumed to have an exponential distribution.

72

M. Rudenkova et al.

Fig. 1. The wireless local area network

Total traffic intensity of real-time network application Λ is: Λ=

K+1 

λk

(1)

k=1

The main feature of real-time network application traffic is following. Inbound traffic intensity is λk (where k = K + 1 is index for AP), the outbound wireless channel delivery intensity is uk . The part of the traffic is dropped with intensity Δλk if a waiting time is higher than an specified guaranteed delivery time Tg . λk = uk + Δλk

(2)

The total network application traffic intensity Λ can be separated into two parts: the flow of network packets which is delivered with an intensity u and the flow of network packets which is dropped with an intensity ΔΛ: Λ = u + ΔΛ

(3)

The intensity of dropped network packets ΔΛ depends on the denial of service probabilities pd and the total network application traffic intensity Λ: ΔΛ = pd ·Λ

3

(4)

Performance Parameters of Wireless Local Area Network

The wireless channel is used to service network packets. The main resource in the wireless channel is throughput C [bit/s]. However, a more important parameter is

Investigation of the Guaranteed Traffic Rate in Enterprise WLAN

73

the throughput in network packets Cp [packet/s] with average length lp [packet/s] which can be sent through the wireless channel. The time τ 1 to transfer one network packet is: lp (5) τ1 = C Let’s assume that μ1 is the intensity of network packet service in a wireless channel without a specific wireless channel media access protocol. We have: τ1 =

1 μ1

(6)

If the wireless channel uses a specific wireless channel media access protocol CF , let the service time be TCF , which is increased by the time tCF because of the introduced overhead for the specific functions of CF. Then TCF = τ 1 + tCF

(7)

The intensity of network packet service in a wireless channel with a specific CF is: 1 μCF = (8) TCF To estimate the functioning capacity of the wireless channel we introduce a coefficient α which depends on the total intensity of network application traffic and the service intensity: α=

Λ μCF

(9)

The the wireless channel load ρ depends on the intensity of serviced network packets u and the specific CF , therefore: ρ=

4

u μCF

= u·TCF

(10)

Investigation of Wireless Channel Media Access Protocol

To obtain numerical wireless channel characteristics we used event-driven Network Simulator NS-3 which is a very popular tool and is used in a lot of research works [11,12]. We developed a program for NS-3 [13] to obtain the service time value for a specific scenario such as set of WLAN characteristic (Table 1) for different K. Number of experiments N = 1000000. 2 (Λ) Scenario 1. To obtain the service time value TDCF (Λ) and variance σDCF for CF = DCF the WLAN topology Fig. 1 is used, let K = 4. WLAN characteristic (Table 1). The results of experiments are shown on Figs. 2 and 3. Scenario 2. To obtain the service time value TPCF (Λ) and variance σP2 CF (Λ) for CF = P CF the WLAN topology Fig. 1 is used, let K = 4. WLAN characteristic (Table 1). The results of experiments are shown on Figs. 4 and 5.

74

M. Rudenkova et al. Table 1. The configuration parameters and WLAN characteristics σc

9 us

tSIF S 16 us

CWmax tDIF S

C

54 Mbit/s Λ

l

1500 B

1023

CWmin 15

34 us

lack

250 - 12000 packet/s K

lCF −P OLL 20 B

Fig. 2. Evaluation of service time TDCF (Λ) (CF = DCF )

2 Fig. 3. Evaluation of variance σDCF (Λ) (CF = DCF )

14 B 4

Investigation of the Guaranteed Traffic Rate in Enterprise WLAN

75

Fig. 4. Evaluation of service time TPCF (Λ) (CF = P CF )

Fig. 5. Evaluation of variance σP2 CF (Λ) (CF = P CF ) 2 The results show that σDCF (Λ) < 1.0 and σP2 CF (Λ) < 1.0. Therefore, in the developed analytical model, the wireless channel service time intervals could be described by an arbitrary distribution law. Let’s obtain dependence of delivery intensity uC F and total intensity of traffic Λ for CF = DCF and CF = PCF Fig. 6. The Fig. 6 shows that dependencies have two parts. In the first part the delivery intensity u increases linearly with traffic intensity increasing Λ. There

76

M. Rudenkova et al.

is no queued network packets. In the second part the delivery intensity u does not depend on the intensity of traffic Λ because of queued network packets. Therefore, the developed analytical model should take into account the limited queue.

Fig. 6. Evaluation of delivery intensity u for CF = DCF uDCF (Λ) and CF = P CF uPCF (Λ)

5

Model Formulation

For enterprise WLAN (Fig. 1) with wireless channel characteristics (Sect. 4) 2 TDCF (Λ), σDCF (Λ) (CF = DCF ) and TPCF (Λ), σP2 CF (Λ) (CF = P CF ) let’s develop modification of M/G/1/s model to determine guaranteed delivery intensity of real-time traffic uaCF for specified guaranteed delivery time Tg . First, let’s assume M/M/1/s model as the basic model of wireless channel where s is the queue size. We assume the number of places in the queue s depends on the number of wireless stations K, the guaranteed delivery time Tg and the CF protocol service time: (11) s = K · (Tg /TCF ) The system has i states (i = 0, s + 1):

Investigation of the Guaranteed Traffic Rate in Enterprise WLAN

77

when i = 0 - the wireless channel is empty, there are 0 packets waiting the service; when i = 1 - the wireless channel services 1 packet, there are 0 packets waiting the service; when i = 2 - the wireless channel services 1 packet, there is 1 packet waiting the service; when i = x - the wireless channel services 1 packet, there are x − 1 packets waiting the service; when i = s + 1 - the wireless channel services 1 packet, there are s packets waiting the service. The probabilities Pi (i = 0, S + 1) of these states are: P0 = P1 =

1+α+α·

1  K+1

αk

1+α+α·

α K+1

αk

Ps+1 =

...

k=1 k=1

(12)

s

α·α  k 1+α+α· K+1 k=1 α

To switch to M/G/1/s model let’s apply the Khintchine-Pollaczek rule. Let the multiplier coefficient be γ:   2 σCF 1+ 2 (TCF ) (13) γ= 2 2 where TCF is the average service time for the specific CF . σCF is the variance of service time for the specific CF . When the new probabilities of system states for M/G/1/s model of wireless channel are: i−1 αi ·γ 2 P =   i∈1I i−1 i i 2 + i∈2I αi ·γ 2 i∈1I α ·γ (14) i 2i ·γ α P  i∈2I =  i−1 i i 2 + i∈2I αi ·γ 2 i∈1I α ·γ

where I = 1I + 2I is the set of states, 1I – is the subset of odd states, 2I – is the subset of even states. The average number n of packets in the system is: n=

s+1 

i · Pi

(15)

i=1

The guaranteed delivery rate of network applications traffic ugCF passing through the wireless channel with a specific CF : ugCF = Λ · (1 − Ps+1 )

(16)

78

M. Rudenkova et al.

or ugCF



= Λ· ⎝1 −  i∈1I

αi ·γ

αi ·γ

i−1 2

i−1 2

+





i

i∈2I

αi ·γ 2



⎠ + Λ ⎝1 −

⎞ i αi ·γ 2 ⎠ i−1   i i 2 + i∈2I αi ·γ 2 i∈1I α ·γ

(17) a is determined as: The actual service time TCF a = TCF

n uCF

(18)

The efficiency of packet delivery using the specific CF is determined as: UCF =

1 a TCF

(19)

a Let’s obtain the actual service time TCF (Λ) and the efficiency of packet delivery UCF (Λ) for WLAN (Fig. 1) with characteristics and parameters (Table 1) CF = DCF, P CF .

Fig. 7. The efficiency of packet delivery UCF CF = [DCF, P CF ]

6

Methodology for Guaranteed Delivery Rate Estimation

For enterprise WLAN with structure (Fig. 1), parameters (σc , CWmax , CWmin , tSIF S , tDIF S , lack , C, Λ, K, l, lCF −P OLL ) and specified CF we provide methodology to determine guaranteed delivery rate of traffic for specified guaranteed delivery time. The methodology includes the following steps:

Investigation of the Guaranteed Traffic Rate in Enterprise WLAN

79

a Fig. 8. Actual service time TCF CF = [DCF, P CF ]

Step 1. Determine the configuration parameters of the wireless channel, specific CF and determine the range of WLAN characteristics and parameters set. Example: WLAN Fig. 1, K = 4, CF = DCF , WLAN characteristics and parameters set Table 1. Step 2. Using the ns-3 program which describes the topology of the WLAN of interest, the set of characteristics and configuration parameters, obtain depen2 (Λ), uCF (Λ) and plot the numerical results. dencies TCF (Λ), σCF Example: See results on Figs. 2, 3 and 6. Step 3. Using equations (14) from Sect. 5, obtain Ps+1 (α) Example: The denial of service probability pd for CF = DCF and K = 4 vs. α (Fig. 9). Step 4. For specified Tg : (1) using obtained analytical results from Sect. 5. (Figs. 7 and 8), obtain Λ a = Tg ; for TCF 2 (Λ) and equation ( 13) obtain (2) using results of simulation for TCF (Λ), σCF γ; (3) using Eqs. (8) and (9) obtain α; (5) using α and Fig. 9 obtain Ps+1 ; (6) using Eq. (16) obtain uaC F ; Example: (1) let Tg = 0, 001s, using Figs. 7 and 8 Λ ≈ 3100packet/s; (2) using results of simulation Figs. 2 and 3 and Eq. (13) γ ≈ 0.56; (3) using Eqs. (8) and (9) α ≈ 1.0; (5) using α and Fig. 9 Ps+1 ≈ 0.05; (6) using Eq. (16) obtain uaDCF ≈ 2945packet/s;

80

M. Rudenkova et al.

Fig. 9. Denial of service probability pd (DCF)

7

Conclusion

The main contributions in this research are as follows: The wireless channel service time and variance for DCF and PCF wireless channel media access protocols under certain conditions (WLAN parameters and characteristics) are obtained using NS-3. The analytical model of enterprise WLAN is developed. Using the equations and the simulation results, the dependencies on actual service time and intensity of traffic are obtained. A methodology to obtain the guaranteed intensity of traffic is proposed. An Example to obtain the guaranteed intensity of traffic is provided.

References 1. Szigeti, T., Barton, R., Hattingh, C., Briley Jr., K.: End-to-End QoS Network Design, 2nd edn. Cisco Press, Indianapolis (2014) 2. RFC 1633 - Integrated Services In The Internet Architecture: An Overview. Tools. Ietf. Org, 2020, https://tools.ietf.org/html/rfc1633. Accessed 20 Sept 2020 3. Bianchi, G.: Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J. Sel. Areas Commun. 18, 535–547 (2000) 4. Ziouva, E., Antonakopoulos, T.: CSMA/CA performance under hightraffic conditions: throughput and delay analysis. Comput. Commun. 25, 313–321 (2002)

Investigation of the Guaranteed Traffic Rate in Enterprise WLAN

81

5. Yang, X.: Performance analysis of priority schemes for IEEE 802.11 and IEEE 802.11e wireless LANs. IEEE Trans. Wirel. Commun. 4, 1506–1515 (2005) 6. Malone, D., Duffy, K., Leith, D.: Modeling the 802.11 distributed coordination function in nonsaturated heterogeneous conditions. IEEE/ACM Trans. Netw. 15(1), 172 (2007) 7. Daneshgaran, F., Laddomada, M., Mesiti, F., Mondin, M.: Unsaturated throughput analysis of IEEE 802.11 in presence of non ideal transmission channel and capture effects. IEEE Trans. Wirel. Commun. 7, 1276–1286 (2008) 8. Shaaban, S., et al.: Performance evaluation of the IEEE 802.11 wireless LAN standards. World Congress Eng. I (2008) 9. Ali, Q.: Performance evaluation of WLAN internet sharing using DCF & PCF modes. Int. Arab J. e-Technol. (2009) 10. Tinnirello, I., Bianchi, G., Xiao, Y.: Refinements on IEEE 802.11 distributed coordination function modeling approaches. IEEE Trans. Veh. Technol. 59, 1055–1067 (2010) 11. Yin, Y., Gao, Y., Hei, X.: Performance evaluation of a unified IEEE 802.11 DCF model in NS-3. In: Song, H., Jiang, D. (eds.) Simulation Tools and Techniques. SIMUtools2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 295, pp. 395–406. Springer, Cham (2019) 12. Deutsch, P., Veyster, L., Cheng, B.-N.: LL SimpleWireless: A Controlled MAC/PHY Wireless Model to Enable Network Protocol Research 13. Nsnam. n.d., ns-3: a discrete-event network simulator for internet systems. Available on https://www.nsnam.org/ 14. IEEE Standard for Information technology - Telecommunications and information exchange between systems Local and metropolitan area networks-Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Std 802.11-2016 (Revision of IEEE Std 802.11-2012), 14 Dec 2016

SARSA Based Method for WSN Transmission Power Management Alexander Alexandrov(B)

and Vladimir Monov

Institute of Information and Communication Technologies - Bulgarian Academy of Sciences, Akad. G.Bonchev 1113, Sofia, Bulgaria {akalexandrov,vmonov}@iit.bas.bg http://www.iict.bas.bg

Abstract. The scope of this research is to propose an adaptive machine learning approach which can help the WSN’s nodes to manage their transmission power and to improve the internode wireless communications. The optimized transmission power has benefits in terms of WSN energy consumption and RF interlink interference. The paper proposes an adaptive method of a wireless sensor node based on Multi-Layer Perceptron (MLP) network representation and machine learning. The presented in the paper approach uses the SARSA (State-Action-RewardState-Action) algorithm which is a form of reinforcement machine learning. The aim of the new method is to improve the sensor nodes Transmission Power Management (TPM) process. This inspires many practical solutions that max-imize resource utilization and prolong the shelf life of the battery-powered wireless sensor networks. Keywords: ANN

1

· MLP · Transmission power control

Introduction

Internode communications are usually the most energy consuming event in Wireless Sensor Networks (WSNs). One way to significantly reduce energy consumption is by applying an adaptive transmission power management techniques. This approach dynamically adjusts the transmission power in which depends on factors as wireless link Quality of Service (QoS) and the wireless node Received Signal Strength (RSS) value. As is illustrated on the Fig. 1 the reliable connection between sensor nodes depends on the distance between nodes, received signal strength and the level of the existing RF noise. In the real environment, the deviation between the needed transmission power for reliable communication between WSN nodes at one and the same distance can reach dramatically high values because of the mentioned above factors.[1] The task of the WSN power management (WSN-PM) stays more complex when the propagation of the RF transmission signal is influenced by the factors which are time changeable as cyclic sources of RF noise, interference RF sources with variable sizes and etc. Therefore, one of the possible ways to solve the c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 82–93, 2020. https://doi.org/10.1007/978-3-030-66242-4_7

SARSA Based Method for WSN Transmission Power Management

83

Fig. 1. Wireless sensor network with RF barrier between Note 17 and Node 19 and RF noise around Node 3.

complexity problem is to use an adaptive method of a wireless sensor node based on a self-learning Artificial Neural Network (ANN). The term machine learning is a set of algorithms and statistical models that software application use to perform a specific task without using explicit instructions, relying on patterns and inference instead. It is seen as a subset of artificial intelligence. The method takes place when the problem is too complicated to be solved in real time, or in case that is not impossible the problem to be solved in a classical way. One of the machine learning methods is the Reinforcement Learning (RL) [2]. The method of Reinforcement Learning uses an agent executor - environment approach and is based on the concept of reward. Reinforcement Learning involves two main entities: an agent and the environment (Fig. 2). The agent plays as a learner and decision-maker at the same time, while the environment is unpredictable and unknown which influences the agent’s performance. Where: Sk - represents the status of the environment; ak – actions – decisions of the Agent. It is noted by default that the agent can choose among a predefined list of possible actions. rk - feedback called reward which evaluates the effect of the actions ak The objective function of the reinforcement learning approach is as follows: In our case the target of the objective function for the reinforcement learning approach is to maximize the cumulative reward rk as follows:

84

A. Alexandrov and V. Monov

Fig. 2. Reinforcement Learning model - the interaction between an agent and the environment.

M AX

k=∞ 

λk E[rk (ak , sk )]

(1)

k=0

where: λk - is the probability distribution of the k reward A possible implementation of the reinforcement learning methods is the Temporal Difference (TD) Learning approach. The TD approach refers to a class of the model-free reinforcement methods which learns by the state of the current estimate of the value function. The possible options of the TD methods are the Q-Learning, SARSA, Rescorla-Wagner, PVLV and etc. In the current research, we are focused mainly on the SARSA method and the proposed algorithm as relatively the most adaptive and flexible for the needs of the WSN power management. SARSA is part of the group of Temporal Difference (TD) algorithms used in Reinforcement Learning and it was proposed in 1994 by Rummery & Niranjan [3,4]

2

Related Work

To overcome the disadvantages of the proactive and reactive techniques, machine learning represents an attractive solution [5] to reach a defined goal by learning the dynamics of the WSNs [6,7], predicting and adapting the transmission power values in different conditions. The objective is making WSNs autonomous without the intervention of developers and users to set the transmission power. To the best of our knowledge, only a few contributions have applied machine learning in TPC, mainly Reinforcement Learning (SARSA, Q-Learning and etc.) and fuzzy logic [8].

SARSA Based Method for WSN Transmission Power Management

85

Q-Learning in WSNs has been used as WSN management approach in the literature but mainly for path selection in routing protocols and sleeping techniques, maintaining constant learning factors [9]. The static values would either bring the system slowly to convergence or make the system too reactive if the learning factor is constantly low or high respectively. The reinforcement learning [10]method is similar to Q-Learning but has some additional benefits. In [11] the reinforcement learning approach is used to calculate and update the weights in the Neural Networks. In [12]the reinforcement learning is used for adaptive routing in WSNs. Other approach used reinforcement learning is described in [13] for task scheduling mobile nodes communication in WSns. The authors from [14,15] propose different variations of Task Scheduling Algorithm for adaptive power management in WSNs SARSA [16–18] as a reinforcement learning method is similar to Q-Learning. The main difference between SARSA and Q-Learning is that SARSA uses an on-policy algorithm which means that SARSA calculates the Q-value based on the action executed by the current policy and is contrary to the off-policy used in Q-Learning.

3 3.1

Proposed Model and SARSA Based Method Implemented Core Technologies – Modified Multi-layer Perceptron

In the current development, we represent the WSN as a set of Multi-Layer Perceptron’s (MLPs). Every wireless node can be represented as a perceptron consisting of four components, i.e. inputs, weights, activation function, and output. The generalized architecture of an MLP perceptron related to the sensor node power management is given in Fig. 3.

Fig. 3. MLP based model of WSN node.

A is shown on the diagram above, different inputs with different weights are captured, and in our implementation if some weights match threshold values, it may activate the function to generate an output. The proposed MLP architecture consists of three types of layers such as input, hidden and output similar to

86

A. Alexandrov and V. Monov

[12,13]. Our approach is utilizing unsupervised back propagation based learning in which threshold values are used as the activation function. If output values do not matches, it can be adjusted. The proposed MLP model of the wireless sensor node is shown in Fig. 4. The proposed relatively low number of the nodes (only 4) in the hidden layer is related to the hardware limitations of the simulated sensor node embedded microcontroller and memory. A bigger number of nodes in the hidden layer will increase drastically the needed resources and time for calculation and will consume more power which is an real issue in the battery powered sensor nodes.

Fig. 4. MLP power management model with a single hidden layer of WSN node.

The considered mechanism takes as input the mode as well as the energy consumption in a specific interval of time. The captured weights are processed in the hidden layer. The three possible outputs are 100% Power transmission, 50% Power transmission and No transmission (0% Power transmission). According to the MLP diagram above the inputs of the MLP model of a sample WSN node are as follows: – QoS – Quality of Service. This parameter is calculated by the wireless sensor node and depends on the bandwidth, packet delay, and packet loss real-time measurement; – Tx mode – the mode when the wireless sensor device transmits RF packets. The transmission mode refers to the mechanism of transferring data between two devices connected over the network. In the current research is considered

SARSA Based Method for WSN Transmission Power Management

– – – –

87

only the Tx mode parameter transmission power which can vary from 0 to 100% of the existing RF device transmission capacity; Rx mode – mode of the receiving data packets from the sensor node; Sleep mode – mode when the sensor node doesn’t transmit or receive any data; Node ID – the unique ID assigned of the node during the WSN forming and configuration. RSS – Received Signal Strength. Also referred to as RSSI (Received Signal Strength Indicator) is the parameter calculated on the basis of the RF power presented in the received radio signal. RSS is measured in dB and typically vary between 0dBm (excellent) and -110 dBm (very poor).

The output of the proposed MLP model is related to the level of power transmission as the main energy utilization parameter and the key factor for transmission power management. In the active mode (Tx or Rx mode), the node fall in the following active patterns: 100% transmit power, 50% transmit power and 0% transmit power. The proposed method, considered in this paper consists of three main phases – data collection, learning, and results in phases. Data collection – in this phase, every wireless sensor node keeps track of the RF packets received from neighbors, the packets forwarded to neighbors and the average energy consumption in a specific period of time. This phase may take time to get a few optimal values of the system usage over a specific period of time. The following parameters are collected and calculated during the initial data collection phase: – the average value of the RSS signal for the last 10 received RF packets; – the average value of the QoS parameter calculated for the last 10 received RF packets; – Tx mode is set to 100% RF transmission power; – Rx mode is set to state 0 (wait); – Sleep mode is set to state 0(wait); – NodeID is assigned and fixed during the WSN configuration; Learning phase – in this phase, the modified MLP is trained to identify different communication sources which are located in its environment. In this stage, the sensor node learns the parameters of packets which the neighbor wireless node receives and sending over a specific time and the related energy consumption. The learning process is based on the SARSA algorithm as a form of implementation of Reinforcement Learning. Based on the SARSA based Reinforcement Learning function definition described in details in [7], we have: Qk = rk (sk , ak ) + γ maxQ(Sk , ak , wk ) where: rk – reinforcement value

Qk ∈ (0, 0.5, 1)

(2)

88

A. Alexandrov and V. Monov

sk - state of the environment in stage k ak – action state γ - discount factor 0 ≤ γ ≤ 1 wk – weights in stage k maxQ(sk , ak , w) - is the function value state/action A diagram which describes the practical implementation of the proposed method is shown on Fig. 5.

Fig. 5. The working mechanism of the proposed method.

In the proposed method the learning process starts with a preliminary fixed combination of weights (wk ), sk = 0 and ak = 0, forming the initial function value state/action Q(sk , ak , w). During the iterations stages of the learning process, Q-function generates a corrective signal and send it to the input of the system. The reinforcement value rk provides for every new state S a signal that can be reward or punishment. In our case, rk takes values −1, 0 or 1. The discount factor γ role is to mark the importance of future reward. In our case,γ takes only two values: 0 or 1. The captured weights (wQoS , wT x , wRx , wsleep , wN odeID and wRSS ) are multiplied with the input values and processed in the hidden layer for an activation function generation.

SARSA Based Method for WSN Transmission Power Management

89

As part of the reinforcement learning process the SARSA algorithm follows the main actions shown on Fig. 2: – – – –

the environment sends his state to the agent; the agent takes action in response; the environment sends a pair of next state and rewards back to the agent; the agent updates its knowledge with the feedback from the environment to evaluate its last action; – the cycle continues until the environment sends a termination signal. The updated equation, related to the modified SARSA algorithm is: QSt , at ← QSt , at + α[rt+1 + γQSt , at+1 − QSt , at ]

(3)

where Q – action value which refers to state S and action a in moment t and t+1; St – State of the environment in moment t; at – action of the agent in moment t; rt+1 - reinforcement value in moment t+1; α – learning rate level α ∈ [0, 1]; γ – discount factor γ ∈ [0, 1]; The NS2 simulation of the proposed method is based on the following pseudo code which was used in the software implementation of the proposed SARSA based method: Prerequisites: State G = 1, n; Actions A = 1, n; Reward R = G x A Learning rate Alpha = 0,1; Discount factor Gamma = 0, 1; Function: SARSA Learning (G. A, R, Alpha,Gamma) { Repeat { Initialize S; Calculate A from S using defined policy; Repeat { Take action A; Observe S; Q(s, a) ← (s, a) + Alpha(R + Gamma, Q(S  , A ) − Q(s, a)); S= S’; A= A’; Until S is terminal; } Until Q is not converged; } }

90

A. Alexandrov and V. Monov

The learning phase takes a time which depends on the needed accuracy of the system. Results – In this phase, the accuracy of the learning process is reviewed. The system is capable to calculate the needed transmission energy amount depend on the current topology of the neighbor nodes and their current status. Based on the described above method were prepared simulations based on the SARSA algorithm and Q-Learning algorithm. The executed simulation experiments based on NS2 network simulator shows that the learning phase has a typical length between 1 and 10 hours for 1000 sensor node based WSN and depends on the needed accuracy of the wireless system. The experimental results from the NS2 simulations if the Q-Learning and SARSA algorithm are shown on Tables 1 and 2 accordingly. Table 1. Results from the NS2 based Q-Learning simulation Power level A

R

Iteration steps

0%

0,187 0,194

1

10 %

0,073 0,072

200

20 %

0,148 0,147 1000

30 %

0,036 0,036 2300

40 %

0,479 0,476 3000

50 %

0,57

0,062 11200

Table 2. Results from the NS2 based SARSA simulation Power level A

R

Iteration steps

0%

0,112 0,121

1

10 %

0,341 0,339

100

20 %

0,348 0,337

250

30 %

0,215 0,287

500

40 %

0,421 0,429

700

50 %

0,036 0,036 6000

Using the NS2 network simulator we did multiple simulations with implemented Q-Learning and the proposed modification of SARSA algorithms to see the performance and the reliability of the calculated results. The diagram from Fig. 6 shows that the proposed modification of SARSA algorithm is sensitively faster and reach the level of the predefined power level

SARSA Based Method for WSN Transmission Power Management

91

of the simulated sensor node. As is shown from the diagram after approximately 6000 iterations the SARSA algorithm achieved the predefined level of 50 percent power level compared to the 11000 iterations of the Q-Learning algorithm.

Fig. 6. The performance of SARSA compared to the Q-Learning algorithm

4

Conclusions

We have proposed a new model and adaptive method for wireless sensor node power management based on the SARSA algorithm which uses an AI Reinforcement Learning approach. The proposed sensor node model is developed on the basis of Multi-Layer Perceptron (MLP) network representation and machine learning. The simulation results show that the implemented in a wireless sensor node SARSA algorithm has sensitively better performance compared to the related Q-Learning algorithm. At the same time, the software implementation of the SARSA algorithm is more compact and uses less sensor node microcontroller resources compared to the Q-Learning algorithm. This inspires many practical solutions that can maximize resource utilization and prolong the shelf life of the battery-powered wireless sensor networks.

92

A. Alexandrov and V. Monov

References 1. Gummeson, J., Ganesan, D., Corner, M.D., Shenoy, P.: An adaptive link layer for heterogeneous multi-radio mobile sensor networks. IEEE J. Sel. Areas Commun. 28, 1094–1104 (2010) 2. Lange, S., Gabel, T., Riedmiller, M.: Batch reinforcement learning. In: Wiering, M., van Otterlo, M. (eds.) Reinforcement Learning. Adaptation, Learning, and Optimization, vol. 12, pp. 45–73. Springer, Heidelberg (2012) 3. Rummery, G., Niranjan, M.: On-line Q-learning using Connectionist systems, Technical report no.166, University of Cambridge, Engineering Department (1994) 4. Watkins, J.C.H.: Learning from Delayed Rewards, Ph.D. thesis, University of Cambridge, England (1989) 5. Torrey, L., Shavlik, J.: Transfer learning. In: Handbook of Research on Machine Learning Applications and Trends: Algorithms, Methods, and Techniques, pp. 242– 264. IGI Global, Hershey, PA, USA (2009) 6. Sung, Y., Ahn, E., Cho, K.: Q-learning reward propagation method for reducing the transmission power of sensor nodes in wireless sensor networks. Wirel. Pers. Commun. 73, 257–273 (2013) 7. Udenze, A., McDonald-Maier, K.: Direct reinforcement learning for autonomous power configuration and control in wireless networks. In: Proceedings of the NASA/ESA Conference on Adaptive Hardware and Systems, AHS 2009, pp. 289– 296, San Francisco, CA, USA, 29 July-1 August 2009 8. Forster, A.: Machine learning techniques applied to wireless ad-hoc networks: Guide and survey. In: 3rd International Conference on Intelligent Sensors, Sensor Networks and In-formation, pp. 365–370. IEEE (2007) 9. Alexandrov, A., Monov, V.: Q-learning based model of node transmission power management in WSN. In: Proceedings of International Conference on Big Data, Knowledge and Control Systems Engineering BdKCSE 2018, pp. 15–112, 21–22 November 2018 10. Kaelbling, L.P., Littman, M.L., Moore, A.P.: Reinforcement learning: a survey. J. Artif. Intell. Res. 4, 237–285 (1996) 11. Hocenski, Z., Antunovic, M., Filko, D.: Accelerated gradient learning algorithm for neural network weights update. In: Lovrek, I., Howlett, R.J., Jain, L.C. (eds.) KES 2008, Part I. LNCS (LNAI), vol. 5177, pp. 49–56. Springer, Heidelberg (2008) 12. Kadam, K., Srivastava, N.: Application of machine learning (reinforcement learning) for routing in Wireless Sensor Networks (WSNs). In: 1st International Symposium on Physics and Technology of Sensors (ISPTS-1), Vol. 2012, pp. 349–352, Pune (2012). https://doi.org/10.1109/ISPTS.2012.6260967 13. Cirstea, C., Davidescu, R., Gontean, A.: A reinforcement learning strategy for task scheduling of WSNs with mobile nodes. In: 2013 36th International Conference on Telecommunications and Signal Processing (TSP), pp. 348–353, Rome (2013). https://doi.org/10.1109/TSP.2013.6613950 14. Zhang, B., Wu, W., Bi, X., Wang, Y.: A task scheduling algorithm based on Qlearning for WSNs. In: Liu, X., Cheng, D., Jinfeng, L. (eds.) ChinaCom 2018. LNICST, vol. 262, pp. 521–530. Springer, Cham (2019). https://doi.org/10.1007/ 978-3-030-06161-6 51 15. Wei, Z., Zhang, Y., Xiangwei, X., Shi, L., Feng, L.: A task scheduling algorithm based on Q-learning and shared value function for WSNs. Comput. Netw. 126, 141–149 (2017)

SARSA Based Method for WSN Transmission Power Management

93

16. Van Seijen, H., Van Hasselt, H., Whiteson, S., Wiering, M.: A theoretical and empirical analysis of expected Sarsa. In: 2009 IEEE Symposium on Adaptive Dynamic Programming and Reinforcement Learning, Nashville, 30 March-2 April 2009, pp. 177–184 (2009). https://doi.org/10.1109/ADPRL.2009.4927542 17. Yu, S., Zhou, J., Li, B., Mabu, S., Hirasawa, K.: Q value-based Dynamic Programming with SARSA Learning for real time route guidance in large scale road networks. In: Proceedings of the International Joint Conference on Neural Networks, pp. 1–7 (2012) 18. Wen, F., Wang, X.: Sarsa learning based route guidance system with global and local parameter strategy. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E98A(12), 2686–2693 (2015)

Method of Frequency Coding in Microwave RFID Sergey Suchkov , Viktor Nikolaevtsev(B) , and Dmitry Suchkov Saratov State University named after N.G. Chernyshevsky, Astrakhanskaya str. 83, 410012 Saratov, Russia [email protected]

Abstract. The concept of constructing of a radio frequency identification system at frequencies 6 GHz based on frequency coding using radio frequency identification tags on resonators on bulk acoustic waves with high Q factor is presented. The axially symmetric 3D structure of the film piezoelectric resonator with the quasi-single-crystal AlN film on the acoustic Bragg reflector which is formed from the alternating molybdenum and silicon oxide layers was considered. Optimization of the acoustoelectronic FBAR resonator design for the RFID tag in the frequency band 10–13 GHz was accomplished. The dependence of the top electrode thickness upon the required resonant frequency of the FBAR resonator was obtained. Design of the RFID tag in the frequency band 10–13 GHz was proposed. There are real technical possibilities for creating of the RFID system in the frequency band 6–30 GHz with the FBAR resonators. Such systems will be protected to electromagnetic fields and ionizing radiation and they will have the high temperature stability characteristic of the FBAR resonators. Keywords: Radio frequency identification · RFID tag problem · Frequency coding · FBAR resonators.

1

· Anticollision

Introduction

Currently, radio frequency identification (RFID) systems are widely applied all around the world for building of automatic systems for accounting and control of the large flows of goods, passengers, vehicles and other objects. These systems meet the demands of the operative control and logistic operations and reduce the negative influence of the “human factor”. The major part of RFID systems are based on radio frequency identification tags (RFID tags) on integrated circuits (ICs) which operate in the frequency bands “130 kHz”, “13.5 MHz”, “900 MHz”, and most recently, in the “2.4 GHz” band. Depending upon the frequency band, they have the distance of the objects identification 10 cm to 5 m. The advantage of such tags is the low price, and the This work was supported by the Ministry of Education and Science of Russia in the framework of project No. FSRR-2020-0005. c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 94–104, 2020. https://doi.org/10.1007/978-3-030-66242-4_8

Method of Frequency Coding in Microwave RFID

95

disadvantages are associated with the semiconductor chip of the IC, which is sensitive to the external electromagnetic fields, the ionizing radiation, and also to the temperature changes. Under these influences, the code in the IC RFID tag can be changed or even destroyed. Therefore, the past 15 years, RFID systems based on tags on surface acoustic waves (SAWs) reflective delay lines has been developed. Such RFID systems are increasingly being realized to account for particularly valuable and critical objects [1–3]. RFID tags on SAW are resistant to the indicated influences and changes, and they also require less energy of the interrogation impulse for the same identification frequency bands than the RFID tags on IC. In particular, the system of accounting for cargo turnover at the International Space Station was built using such RFID tags [4]. SAW RFID tags were developed for the open frequency bands “433 MHz”, “900 MHz”, “2.45 GHz” and “6 GHz” [5,6]. One of the difficulties in using of the RFID systems is the presence of domestic and industrial electromagnetic interferences. They reduce the distance of the identification of objects and they are significant for all the indicated frequency bands, except for the “6 GHz” frequency band. However, in the coming years the mobile communication systems operation is also planned to expand on this frequency band. Therefore, it is advisable to consider those frequency bands in which the domestic and industrial electromagnetic interferences are not expected in the near future. As a consequence, we can consider the frequency band 6–30 GHz. In this band, the creation of digital ICs and, therefore, RFID tags on ICs are not expected in the near future. Therefore, the element base for RFID tags for this band could be the analog acoustoelectronic devices. It is obvious that SAW RFID tags are not applicable in the indicated band due to the high propagation losses [6]. However, if one switch from the time domain of the formation of code signals to the frequency domain, in which the signal is not the pulse delay time, but frequency of the signal which is excited by the tag, then one can use the thin film resonators on the bulk acoustic waves (FBAR), which have relatively small losses on resonant frequency (2–3 dB) and high Q factor (about 1000) [7,8] in the considered frequency band. Another important problem of RFID systems is the collision of code signals from several RFID tags at the input of a code reader, which arises in the case of simultaneous identification of many RFID tags. In the RFID systems with the SAW tags the different methods are used: the spatial discretization method [1] the correlation method [3,4,9], the multilateration method [10,11]. For the frequency coding, the spatial discretization method becomes very convenient due to the high directivity of the electromagnetic signal propagation with a small reader antenna size. In addition the application of the unlimited anticollision method based on the multilateration method using the multiband tags and the multi-antenna reader system is also simplified [11].

96

2

S. Suchkov et al.

Frequency Coding

For frequency coding, the reader must generate and radiate enough long in time (up to 10 s) interrogation impulses, which are sequences of short radio pulses in which the carrier frequency changes consequentially in discrete in accordance with the frequency code zones. When a certain frequency of the interrogation impulse coincides with the resonant frequency of the coded FBAR, oscillations occur in it and they decay exponentially after the exposure of the interrogation impulse of the reader according to the law ω0

e− 2Q t ,

(1)

where ω0 = 2πf0 , f0 is the resonant frequency of the FBAR and Q is its Q factor. Then the e times decrease time of the oscillation amplitude is te =

Q . πf0

(2)

The resonator is connected to the RFID tag antenna. The damped current oscillations in the resonator radiate the corresponding signal into space. The signal should be detected by the reader and it should be associated with the code frequency zone of the interrogation impulse. Thus, if the RFID tag consists of the several FBARs with different resonant frequencies, their signals form a number of frequencies in the reader, which is the code of this tag. We consider the RFID system in the frequency band 10–13 GHz with 30 frequency code zones Δfi = 100 MHz (i = 1.2, ..., 30). In such a system, for example, if there are eight FBARs in the RFID tag, the number of possible codes will be 8 = 5 825 925. NK = C30

(3)

This number of codes is sufficient for the most possible applications of very expensive RFID tags on FBAR. For the code frequency fi the interrogation pulse duration T0 is determined by the frequency code zone bandwidth T0 = 1/Δf i = = 10 ns. In this case, the interrogation impulse code zones will contain from 100 to 130 oscillation periods, and their quantity depends upon the code zone number. This pulse duration determines the distance of the “dead zone”, in which the code signal of the RFID tag will be suppressed by the reader signal. For this case the “dead zone” distance is 1.5 m. In order to avoid signal spectral leakage into the neighboring code areas the required Q factor of the FBAR code resonators is also determined by the size of the code area and it must provide the emitted signal bandwidth significantly less than the code area bandwidth. Therefore, it will be enough to have a resonator bandwidth BR = 20 MHz, then the loaded Q factor of the resonators Qi should be at least 500 at i = 1 and at least 650 at i = 30. Resonators with such Q factors of are really feasible in the frequency band 10–13 GHz [7,8].

Method of Frequency Coding in Microwave RFID

97

It follows from (1) that the resonator decay time is te = 16 ns for all of the code zones. If the distance between the RFID tag is, for example, R = 10 m, the code pulse delay time is TD = T0 + R/c=76 ns, and the total time of one code signal receiving is Tr = TD + te =92 ns. Thus, the time of interrogation of one code zone could be taken equal to 100 ns. Then the time of interrogation of all 30 code zones would be about 3 μs. Such operating speed is sufficient to control fast moving objects. So for the velocity of about 300 km/h, during the system code reading, the displacement of the object will be less than 1 mm.

1 4

3

2

Fig. 1. The construction of the RFID tag on FBAR in the frequency band 10–13 GHz.

Shown in Fig. 1 is the construction of the proposed RFID tag. All the RFID tag including the hybrid antenna is fabricated on the polycrystalline corundum

98

S. Suchkov et al.

d0

substrate (1). One of the elements of the antenna (2) is connected with the bottom electrodes of the FBAR resonators (3) and another element (4) is connected with the top electrodes. The construction of the hybrid antenna with the coplanar elements allows to obtain the antenna efficiency not less than 90% in the frequency band 10–13 GHz. The size of the antenna is 14 mm for the used frequency band. Microstrips feed the signal from the antenna elements to the FBARs and they are also the matching elements for the resonators with the antenna. In order to analyze of the FBAR frequency responses, we consider the axially symmetric 3D structure of the film piezoelectric resonator with the quasi-singlecrystal aluminum nitride (AlN) film on the acoustic Bragg reflector (ABR) which is formed from the alternating molybdenum and silicon oxide layers (Fig. 2).

Mo AlN Mo SiO2 Mo SiO2 Mo SiO2 Mo

500 μm Fig. 2. The structure of the FBAR resonator.

We simulated the impedance real part frequency response of the piezoelectric resonator in the frequency band 10–13 GHz by means of the software COMSOL R Multiphysics .

Method of Frequency Coding in Microwave RFID

99

As a result of maximum Q factor optimization of FBAR in considered frequency band the following sized of the FBAR structure were determined, which could be used for the RFID tags creation: the thickness of the AlN piezoelectric film is 500 nm, the thickness of alternating layers of molybdenum and silicon oxide is 120 nm, and the number of layers of the Bragg mirror is 7. Results of the simulation show that for the thickness of the ABR layers which is indicated above, the ABR reflection coefficient is not less than 0.95 in all the frequency band of 10–13 GHz. Shown in Fig. 3 is the simulated impedance real part ReZR frequency response of the FBAR for the thickness of the top electrode d0 =200 nm. The loaded Q factor of the resonator is about 1000, which is in the agreement with the results of the works [7,8].

300 250 200

ReZR

150 100 50 0 10.9

10.94

10.98

11.02

11.06

11.1

Fig. 3. The FBAR impedance real part frequency response.

The application of molybdenum piezoelectric resonator electrodes allows to obtain the desirable adhesion of the AlN film to the electrodes. The choice of silicon oxide as the second material for the ABR is associated with the value of the longitudinal BAW velocity, which is close to that of molybdenum, and, at the same time, a significant difference in acoustic impedances of these two materials.

100

S. Suchkov et al.

In order to tune the FBAR resonant frequencies to the required frequency code positions (frequency bands of the code zones), the strong dependence of the FBAR resonance frequency upon the top electrode thickness is used. Shown in Fig. 4 is this dependence. Thus, in order to construct an RFID tag on an FBAR in the frequency band 10–13 GHz, it is required to vary the thickness of the top electrode in the range from 50 to 300 nm.

300

250

d0

200

150

100

50 10

10.5

11

11.5

12

12.5

13

Frequency Fig. 4. The dependence of the top electrode thickness upon the required resonant frequency of the FBAR.

Changing of the FBAR top electrode thickness could be accomplished by means of local ion-beam etching technology [12]. As it follows from Fig. 4, the top electrode thickness d0 of the FBAR for the i-th code zone, should be determined as d0 = 52 + 7i ± 2 (nm).

(4)

So, for the resonator of the first code zone, d0 could vary from 57 to 61 nm, and for the resonator of the 30-th code zone d0 could vary from 260 to 264 nm. In this case, the bandwidth of the code zones is not less than 57 MHz, and the bandwidth of the bandgaps is not less than 43 MHz. It is sufficient to suppress

Method of Frequency Coding in Microwave RFID

101

the code signal in neighboring code zones for a frequency bandwidth 20 MHz for the loaded resonator. The technology of FBARs fabrication with the noted parameters and RFID as a whole is quite feasible using modern photolithographic equipment, vacuum deposition and ion-beam etching installations, which make it possible to create the layered nanoscale structures [12] with an accuracy of ± 2 nm.

3

Suppression of False Signals

Since RFID systems operate with electromagnetic waves propagation in the open space then the surrounding objects reflect the electromagnetic waves and the spurious signals appear at the input of the reader. In order to eliminate such signals, an initial delay (about 1 μs) was used in the SAW RFID tags, after which the reception of code signals began. In such case the spurious signals from objects at a distance up 150 m are removed from the reader. For frequency coding, one could introduce an additional delay line into the tag construction, but this greatly complicates the design of the tag which becomes very expensive. Another way to suppress the spurious reflected signals is the ability of the creation of a narrow radiation pattern of the reader antenna, which is not the technical problem in the frequency band 6–30 GHz. However, in such case it is necessary to orient the reader antenna to the object, which can be done manually or automatically, for example, by means of the phased antenna array (PAA). Using the RFID system in stationary conditions allows one to determine the parameters of all the spurious signals previously and to suppress them during the software processing of the signals which are received by the reader. The correlation method for suppress of the spurious signals based on differences in the amplitude-time characteristics of reflected and code signals is possible. So, the reflected signals have an almost rectangular amplitude-time characteristics which coincides with the characteristic of the code frequency in the interrogation impulse and the code pulses which are radiated by the RFID tag have the exponentially reducing amplitude-time characteristics. Thus, each received pulse should be analyzed on the presence of an exponential amplitude change, which can be done by the known correlation methods. This method also could be used for moving objects identification.

4

Solution of Anticollision Problem

The problem of collision of code signals emerges while the several tags respond to the interrogation impulse. In such case, the code pulses at the input of the reader without anticollision protection form an unreadable set of pulses. As it was already indicated in the previous section, in the frequency band 6–30 GHz, one can apply the spatial separation of the code signals receiving from the RFID tags using a narrow radiation pattern of the reader antenna. Such a method of anticollision protection was proposed in 2002 [1], but its application

102

S. Suchkov et al.

was limited due to the difficulties of a narrow diagram obtaining in the used frequency bands of the SAW tags. A lot of works including those implemented in practice [3,4,9], are devoted to the correlation method of anticollision protection of RFID systems with SAW tags. In brief, it consists in the fact that the reader radiates not one interrogation impulse, but it sequentially radiates the various sets of the time-position impulses with the enumeration of all the used time-position codes. If the timeposition code is the same as the time response which is formed by a particular SAW tag, this tag radiates the autocorrelation signal of a large amplitude in its response. If there is no coincidence, then each of the tags which are located in the identification area of the reader antenna radiates a cross-correlation signal which is much smaller in amplitude. The correlation method of anticollision protection is accomplished, for example, in RFID system at the ISS [4], where up to 30 objects are identified simultaneously. However, this method requires a lot of time to sort through all possible codes for systems with a large number of codes and it is limited by the number of simultaneously recognized objects Nmax by Shannon–Hartley theorem [13] Nmax = BT,

(5)

where B is the system bandwidth, T is the signal time delay in the system. The system which is realized at the ISS is close to the maximum number of codes which are identifying simultaneously in the RFID systems with the SAW tags. The limitation which follows from (5) is explained by the fact that with an increase in the number of tags which are identifying simultaneously, the total level of cross-correlation signals begins to exceed the level of the autocorrelation signal. For frequency coding, the correlation method application is also possible if impulses with carrier frequencies are simultaneously radiated from the given set of the frequency code combinations. But the limitations of its using which were indicated above also take a place. Multiband tags are used in some applications of RFID systems with SAW tags [11]. In such systems only one code pulse is generated in each subband and there are 100 time code zones in each subband. Thus, in a triband system, 1003 = 1 million codes could be used, in a quadband system, 1004 = 100 million codes could be used, etc. In such the RFID system, the limited anticollision protection could be accomplished in one subband with the number of simultaneously identified objects equal to the number of code zones in this subband, in the condition that the group of monitored objects is selected with the same codes in the other subbands. In the RFID system with multiband tags the absolute anticollision protection is also possible with the simultaneous identification of any number of codes generated by pulses from all subbands. But it requires the multilateration signal processing method in the multi-antenna reader [14]. For frequency coding, a multiband method for limited anticollision protection could also be used. So, if one use four subbands: 10–13.3 GHz, 13.3–16.6 GHz,

Method of Frequency Coding in Microwave RFID

103

16.6–19.9 GHz and 19.9–23.2 GHz with 32 code zones then each total number of codes will be 1 048 576 with simultaneous identification of up to 32 codes.

5

Conclusion

These estimates show that there are real technical possibilities for creating of the RFID system in the frequency band 6–30 GHz with acoustoelectronic FBAR resonators. In addition to the advantages already described of the low level of industrial and domestic noise for the secure of the RFID tag code exposed to electromagnetic fields and ionizing radiation such systems also have the high temperature stability characteristic of FBAR resonators. Therefore, in the near future we could expect the creation of such RFID systems.

References 1. Hartmann, C.: A Global SAW ID Tag With Large Data Capacity. In: IEEE Ultrasonics Symposium Proceedings, pp. 65–69. IEEE, Munich, Germany (2010) 2. Harma, S., Plessky, V., Li., X.: Feasibility of ultra-wideband SAW tags. In: IEEE International Ultrasonics Symposium Proceedings, pp. 1944–1947. IEEE, Beijing, China (2008) 3. Kozlovski, N., Malocha, D.: SAW noise-like anti-collision code study. In: IEEE International Frequency Control Symposium Proceedings, pp. 616—621. IEEE, Besancon, France (2009) 4. Brown, P., et al.: Asset tracking on the international space station using global SAW tag RFID technology. In: IEEE International Ultrasonics Symposium Proceedings, pp. 72—75. IEEE, New York, NY, USA (2007) 5. Plessky, V., Reindl, L.: Review on SAW RFID tags. IEEE Trans. UFFC 57(3), 654–668 (2010) 6. Plessky, V., Lamothe, M., Davis, Z., Suchkov, S.: SAW tags for the 6-GHz range. IEEE Trans. UFFC 61(12), 2149–2152 (2014) 7. Umeda, K., Kawamura, H., Takeuchi, M., Yoshino, Y.: Characteristics of an AlN based bulk acoustic wave resonator in the super high frequency range. Vacuum 83(3), 672–674 (2009) 8. Nor, N., et al.: Film bulk acoustic wave resonator in 10–20 GHz Frequency Range. In: 3rd International Conference on Electronic Design (ICED) Proceedings, pp. 481—485. IEEE, Phuket, Thailand (2016) 9. Kojgerov, A., Dmitriev, V., Noskov, A.: Korrelyacionnye svojstva radioidentifikatorov na PAV s fazomanipulirovannymi kodami. M.: Voprosy radioelektroniki. Ceriya OT (4) 5—14 (2010) (in Russian) 10. Bechteler, T., Yenigun, H.: Localization and identification based on SAW ID-tags at 2.5 GHz. IEEE Trans. Microw. Theory Techn. 51(5), 1584–1590 (2003) 11. Vishnevskiy, V.M., Kozyrev, D.V. (eds.): DCCN 2018. CCIS, vol. 919. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-99447-5 12. Pochon, S., Ion-Beam Nano-patterning: experimental results with chemicallyassisted beam. In: SPIE 10589, Advanced Etch Technology for Nano-patterning VII Proceedings, p. 105890. SPIE, San Jose, California, USA (2018)

104

S. Suchkov et al.

13. Shannon, C.: The Mathematical Theory of Communication. University of Illinois Press, Urbana, Illinois, USA, IL (1949) 14. Suchkov, S., et al.: Multiband SAW tag for RFID systems with unlimited anticollision. In: Surface Acoustic Wave Sensors Symposium Proceedings, SAWLab Saxony, Dresden, Germany (2016)

On Synchronisation of ISS-OFDM Signals Semyon Dorokhin(B) Moscow Institute of Physics and Technology, 9 Institutskiy per., Dolgoprudny, Moscow Region 141701, Russian Federation [email protected]

Abstract. Interleaved Spread Spectrum OFDM (ISS-OFDM) is a new spread-spectrum modulation method which is similar to conventional OFDM. Despite properties of the signal itself are quite well studied, the problem of synchronisation remains unsolved. This study is focused on ISS-OFDM baseline synchronisation design. A novel sampling clock offset estimation algorithm is proposed and compared with an approach which is classical in OFDM systems. Simulation of ISS-OFDM communication system shows that the novel SCO estimator is more robust. The entire communication system is modeled as well. It can operate at negative signal-to-noise ratios with acceptable bit error rate.

Keywords: ISS-OFDM spectrum

1

· SCO · Synchronisation · OFDM · Spread

Introduction

Interleaved Spread Spectrum OFDM (ISS-OFDM) is an OFDM-like spread spectrum method which was introduced by Pingzhou Tu et al. [8] in 2006. ISS-OFDM has diversity both in frequency and time domain, which was exploited to adapt ISS-OFDM for cognitive radio. Pingzhou Tu et al. [4] also managed to demonstrate that ISS-OFDM modulation can be used as PARP (peak-to-average-ratio) reduction technique. The same research group [3] suggested parallel FFT demodulation method, which reduced demodulation time. The subband-like spectral structure of ISS-OFDM was exploited in works featuring adaptive subband filtering. Pingzhou Tu et al. emphasised that it is possible to avoid information loss even if some subbands are not present in the spectrum [3]. The above-mentioned researchers suggested [9] flexible adaptive filtering scheme which can be used by several radiodevices to share the same frequency band. This direction was further explored by Qin Danyang et al. [5], who studied ISS-OFDM assuming fading channel model. So far ISS-OFDM was studied primary as a technique for cognitive radio. However, ISS-OFDM has an interesting feature: increasing the number of subcarriers four times allows to decrease the minimal acceptable SNR (signal-to-noise ratio) by 3 dB. With sufficient number of subcarriers it is possible to operate at extremely low SNR and the main limiting factor is computational complexity. c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 105–116, 2020. https://doi.org/10.1007/978-3-030-66242-4_9

106

S. Dorokhin

The available computational power increased significantly since the introduction of ISS-OFDM. Nowadays one can afford to greatly increase the number of subcarriers, thus achieving reliant communication at negative SNR. Despite the fact that ISS-OFDM did not receive much attention in cognitive radio applications, it can be revived as low-SNR communication technique. It can be used in applications where power consumption is a parameter to be minimised (IoT networks). 1.1

ISS-OFDM Properties

Since ISS-OFDM is quite an uncommon type of modulation, a brief insight into its properties may be useful. Let us denote the number of constellation points in one symbol as Nc , and for simplicity assume that the signal is not oversampled, in other words, its spectrum occupies frequencies from zero to sampling rate. Time-Domain. In baseband each ISS-OFDM symbol carrying Nc constellation points ai , i = 0, Nc − 1 consists of Nc2 samples ym , m = 0, Nc2 − 1: ym = yi (n) = ai exp(2πj

in m ), i = m modNc , n =   Nc Nc

(1)

where j is a complex unity. The process of interleaving may bring more clarity to the structure of OFDM (Fig. 1). Every constellation point modulates the corresponding subcarrier. Every subcarrier is upsampled with the factor of Nc , so that there are Nc −1 points between every sample. After that, the i-th subcarrier is shifted by i − 1 sample and all the subcarriers are summed up thus giving the resulting ISS-OFDM signal.

Fig. 1. Signal interleaving

On Synchronisation of ISS-OFDM Signals

107

Frequency Domain. Discrete Fourier Transform of one ISS-OFDM symbol is −2πj

Yk = N ai e

(nNc +i)i 2 Nc

, i = k modNc , n = 

k , k ∈ 0, Nc2 − 1 Nc

(2)

Fig. 2 illustrates this equation. The subcarriers of the same colour correspond

Fig. 2. Structure of spectrum

to the same constellation point. It can be seen that ISS-OFDM also has diversity in frequency domain: every constellation point is spread on Nc subcarriers. This diversity can be exploited to perform adaptive subband filtering, as it was done by P. Tu et al. [9] and Q. Danyang et al. [5]. BER-SNR Performance. It is important to emphasize that ISS-OFDM allows theoretically unlimited potential for BER-SNR performance improvement. As it was derived in [3], ISS-OFDM BER-SNR dependency in case of additive white Gaussian noise (AWGN) model could be described by the following equation:  (3) BER(dB) = 10 log Q( Nc2 · SN R), ∞ 2 where Q(x) is Q-function: Q(x) = √12π x exp(− u2 )du If the parameter Nc is doubled, the number of subcarriers increases be the factor of 4, which results in an improvement of 3dB, as it can be seen in Fig. 3.

108

S. Dorokhin

Fig. 3. Theoretical BER-SNR performance.

Parallel FFT Algorithm. A straightforward [8] implementation of ISSOFDM modulator lacks the BER-SNR property described above. Moreover, it has computational complexity of O(Nc2 ), compared to O(Nc log(Nc )) in case of conventional OFDM. Pu T. et al. [3] suggested parallel modulation scheme, which not only reduced the computational complexity to O(Nc log(Nc )), but also improved robustness to Gaussian noise. In the parallel IFFT-modulation scheme subcarrier corresponding to every constellation point is modulated separately and the result is then combined. For constellation point ai , i ∈ 0, Nc − 1 an array of Nc complex numbers is generated, where the constellation point is placed as the i-th element. The other elements are zeros. Next, Nc -point IFFT is performed. Result of the i-th IFFT block is: yi (n) =

N c −1

nk

in

ak e2πj Nc δk,i = ai e2πj Nc ,

(4)

k=0

which exactly matches the expression (1). Demodulation can be easily done using the inverse version of this algorithm. Cyclic Shift. Using cyclic prefix is a common technique in OFDM systems. It allows to avoid inter-symbol interference and is usually used for coarse time synchronisation, as well as coarse CFO estimation. Therefore it is essential to understand how ISS-OFDM signals behave when the cyclic shift is present. In conventional OFDM cyclic shift results in rotation of the entire constellation and can be easily compensated with the help of pilot tones. In case of ISS-OFDM it is not true. A shift even in one time sample will result in wrong demodulation and further compensation will be needed. Since the DFT is known (2), one can represent ISS-OFDM signal in time domain using Fourier series:

On Synchronisation of ISS-OFDM Signals Nc2 −1

y(t) =



kt 2πj N 2

Yk e

Nc2 −1



kp kt −2πj N 2 2πj N 2

ap e

c

k=0

109

e

c

c

k=0

=

N c −1

−2πj Np2 (p−t)

ap e

N c −1

c

p=0

q

e−2πj Nc (p−t) =

q=0

=

N c −1 p=0

−2πj Np2 (p−t) −πj(p−t) sin(π(p − t)) c ,(5) e sin( π(p−t) Nc )

ap e

where p = kmodNc . If the shift expressed in time samples is an integer, it is quite easy to compensate. Let us suppose that the aforementioned parallel FFT algorithm is used and that there is a cyclic shift of δ (t = i − δ in 5). Let us denote δi = δmodNc , δn =  Nδc . Then y(t = m − δ) = ai−δk e−2πj

(i−δk )δn Nc

(6)

In that case impact of cyclic shift can be expressed as following: constellation point ai will be seen at the output of FFT-block number (i − δk )modNc and it c )δn ). will be multiplied by exp(−2πj ((i−δk )modN Nc If the shift is not an integer of time sample, the situation is much more complicated. Let us suppose that the integer (in terms of time samples) part of the cyclic shift was compensated. It can be seen from (5) that fractional cyclic shift will result in interference between the subcarriers in case of parallel FFT demodulation: the energy of different constellation points will be mixed. The main drawback of parallel FFT demodulation method arises: it separates time samples correspond to different constellation points into different FFT blocks. When there is fractional time shift, every FFT block contains some energy from other constellation points, which is not compensated by demodulation algorithm. That effect will definitely degrade the performance of the systems, the impact of fractional time shift should be studied more carefully. However, this impact and the severeness of degradation will be estimated later via simulations. 1.2

Scope of the Paper

As it was said before, ISS-OFDM received some attention in context of cognitive radio only. As far as the author is concerned, ISS-OFDM was studied in simulations and the question of ISS-OFDM synchronisation is still untouched. This paper is focused on designing the synchronisation algorithm which will take into account effects inherent in real-world systems. Such effects include Carrier Frequency Offset (CFO) and Sampling Clock Offset (SCO). In OFDM systems CFO and SCO are usually coupled [2] and should be estimated jointly. However, CFO is left out of scope of this paper, since it is the initial study on ISS-OFDM synchronisation. After the baseline model is studied, it is possible to move on and design a joint CFO and SCO estimator. This paper focuses on time synchronisation and SCO estimation. The main contributions of this paper are:

110

S. Dorokhin

– Fine time synchronisation and tracking algorithm – Novel SCO estimation algorithm – Simulation of the proposed synchronisation method Moreover, the influence of SCO was studied in terms of BER performance. The rest of the paper is organised as follows: Sect. 2 gives a brief overview of existing synchronisation algorithms, Sect. 3 describes the proposed tracker and estimator, Sect. 4 presents the simulation results followed by a concise conclusion.

2

State of the Art

As it was mentioned above, the area of ISS-OFDM synchronisation is unexplored. Therefore, there is no ISS-OFDM synchronisation algorithms to compare with. However, since ISS-OFDM inherited many properties of conventional OFDM, it is tempting to adapt existing OFDM synchronisation techniques to ISS-OFDM. The existing algorithms were selected to be tested on ISS-OFDM according to the following criterion: – Popularity and simplicity. Since it is the first study on ISS-OFDM synchronisation, only classical OFDM synchronisation algorithms are considered. – Robustness. ISS-OFDM offers acceptable performance at negative SNRs (refer to Fig. 3), so algorithms must comply with this feature. – Scalability in the number of subcarriers. The main method to improve ISSOFDM robustness is to increase the number of subcarriers. That is why this parameter must be explicit in the algorithm’s structure. 2.1

Time-Domain Synchronisation

Generally, there are three approaches to initial synchronisation in OFDM systems. The first one is to use cyclic prefix and correlation alongside with estimator (commonly Maximum Likelihood [10]). Another approach is to perform acquisition based on training symbols [6] or 2D-pilot map [1], without utilising guard interval. The third approach, which Chinese standard DTMB-A relies on, implies using PN-sequences as guard interval [11]. Both PN-sequence and pilot-aided approaches appear to be difficult to scale in the number of subcarriers and to keep robust at the same time. Additional study has to be carried out in order to determine optimal parameters (length of PN-sequence, number of scattered pilots etc.) for low-SNR applications. On the contrary, correlation-based approach is easy to scale as the length of guard interval depends on the number of subcarriers. Averaging over consequent symbols can improve robustness. Moreover, cyclic prefix will be needed to avoid intersymbol interference when fading is taken into account. Therefore, cyclic prefix and correlation approach is chosen for coarse time synchronisation.

On Synchronisation of ISS-OFDM Signals

2.2

111

SCO Estimation

For continuous transmission it is essential to track sampling clock offset (SCO). In OFDM systems there is a classical approach based on pilot correlation between subsequent symbols [7]. It was also shown [2] that SCO and carrier frequency offset (CFO) are coupled in OFDM systems and should be estimated jointly. Since it is the first study on ISS-OFDM synchronisation, CFO is left out of scope. In this paper a novel robust SCO tracking scheme is proposed and compared with this classical approach. The new tracker exploits ISS-OFDM signal structure in modulation domain, yielding promising results. It is also possible to adapt the classical OFDM approach for ISS-OFDM, since the DFT of ISS-OFDM symbol is known. The aforementioned adapted classical approach will be compared with the novel one.

3

Proposed Method

The first step in synchronisation process is typically time synchronisation. For coarse time synchronisation cyclic prefix was added to the modulated signal and the start of the symbol was estimated using correlation. Due to SCO the beginning of symbol slightly drifts away from the observation window. Taking into account the cyclic shift properties of ISS-OFDM described in Sect. 1, a fine time tracker is needed to compensate that drift. 3.1

Time-Domain Tracker

ISS-OFDM symbols carrying Nc constellation points consists of Nc2 points and a guard interval (typically 81 of bare symbol length). For the following analysis it is assumed that correlation-based initial sychronisation algorithm provides the estimation of the next symbol start with an error of no more than N2c . If the signal is upsampled with the factor of k, the total length of a symbol is 9 2 N 8 c k. From (1) it can be seen that y0 (n) = a0 ∀n = 0, Nc − 1, so every Nc sample of non-upsampled signal is the same. The new time tracking algorithm uses this periodicity. The simplified time tracking algorithm consists of the following steps (refer to Fig. 4): 1. jump to the estimated middle of guard interval; 2. Step kNc /2 samples back; 3. Sum up Nc subsequent samples with a distance of kNc between them; 4. Step k samples forward; 5. Sum up again, until Nc steps are performed

Fig. 4. The proposed clock frequency offset tracker

112

S. Dorokhin

Let us explain the idea behind this tracker, assuming interpolation by DFTzero padding for simplicity of analysis. The normalisation factor is set to 1 as it does not affect the results. The signal, interpolated by zero-padding with interpolation factor k (see (2)): Nc2 −1 Nc2 −1

 

yp =

l=0

pl ml −2πj N 2 2πj kN 2

sm e

c

e

c

m=0

Nc2 −1

=



Nc2 −1

sm

m=0

=

p sin(πk(m − kp )) 1 sm e−πjl(m− k )(1− Nc ) πk(m− p ) sin( N 2 k ) m=0 c

−2πj

e

l(km−p) 2 kNc

(7)

l=0

Nc2 −1





Nc2 −1

=



m=0

p

1

sm e−πjl(m− k )(1− Nc ) δm, kp ,

where δi,j is the Kronecker delta. Tracker l, l = 0, k − 1 has starting offset of l samples and provides maximum location estimation ml from following Nc variables: Sil

=

kN c −1 

kNc2 −1 N 2 −1



yp =



p

sin(πk(m − kp ))

1

sm e−πjl(m− k )(1− N )

sin(

p=l m=0 step k

p=l step k

p πk(m− k ) ) N2

(8)

It can be seen from this formula that for a tracker which has a shift of t from the closet a0 sample the abscissa of maximum is not an integer, as it is shifted by l k . Interpolation is used to determine a precise location of maximum for every tracker. Taking into account upsampling and start offset for every tracker yields the following formula for time offset mof f s measured in samples: k−1 (ml − N2c )k + l (9) mof f s = l=0 k It is important to emphasis that the proposed algorithm gives time offset estimation by modulo Nc , and therefore the error of initial estimation must not exceed N2c . 3.2

SCO Estimator

If time synchronisation is performed correctly, one can track SCO in modulation domain based. As it was mentioned in Sect. 1, cyclic shift which is not an integer of one time sample introduces ICI in ISS-OFDM modulation domain, However, for small fractional shifts Δ ICI can be omitted. In that case the demodulation via parallel FFT yields: a ˜k =

N c −1 n=0

kn

yi−Δ (n)e−2πj Nc = Nc ak eπjΔ

sin(πΔ) sin( πΔ Nc )

(10)

If the time tracker is applied, the cyclic shift is caused by SCO ξ. When demodulation via parallel FFT is performed, the cyclic shift introduces phase offset: arg(˜ alk ) = πΔ = πξ(Nc2 + Ng )l,

(11)

On Synchronisation of ISS-OFDM Signals

113

where l is the number of symbol since perfect time-domain synchronisation and Ng is the length of the guard interval. The phase difference of pilots in two subsequent symbols Δφ is proportional to SCO: Δφ , (12) ξ= π(Nc2 + Ng ) where Δφ is the difference between pilots’ phases in subsequent symbols. If one constellation point a0 is reserved for continual pilot tone, a0 remains the same for every symbol and the SCO estimation can be averaged over many symbols, thus improving robustness. 3.3

Simulation Setup

Aforementioned synchronisation algorithms were simulated in Matlab first separately and then as a united system. Gaussian channel model was chosen as the simpliest one to start with. In following simulations only QPSK modulation was used, as the impact of different modulation schemes on synchronisation performance is out of scope of this study. Random data bytes were generated and then scrambled with a PN-sequence of length 214 − 1. Guard interval of 18 symbol length was chosen. The general structure of baseband model is presented in Fig. 5.

Fig. 5. Simulated baseband communication system

Since it is the first study on ISS-OFDM SCO tracking, the CFO has not been taken into account. One of ISS-OFDM subcarriers was reserved for a constant pilot tone to compensate constellation rotation caused by remained frequency offset. SCO was simulated via resampling. Every plot data point was averaged over 4980 symbols, with random time delay being introduced to every group of 60 symbols. Initial synchronisation and tracking algorithm were applied to every group and resulting BER was measured for further averaging.

4

Results and Discussion

SCO and time tracking algorithms described in Sect. 4 were simulated separately as well. Because the algorithms are required to operate at very low SNR, the

114

S. Dorokhin

estimation based on one symbol is not enough. Algorithms must average their estimations over several subsequent symbols. The number of symbols for averaging is a parameter to be optimised. If it is too small, there will be too many errors and it will be impossible to approach theoretical performance limit. If this parameter it too large, the theoretical limit can be approached, but the algorithms will have redundant computational complexity. The optimal value was chosen experimentally by running several simulations and the final results are presented in Fig. 6.

(b) SCO algorithms comparison

(a) Proposed time tracker error probability

Fig. 6. Synchronisation algorithms simulation

Time tracking algorithm included averaging over 15 consequent symbols, initial synchronisation algorithm was averaged over 3 symbols. For time tracking algorithm the probability that an error of at least one sample is present was calculated. It can be said that averaging allowed to make time-domain tracker quite reliant.

Fig. 7. Performance of the modeled communication system

SCO tracker was compared with the one proposed in [7] and both SCO trackers were averaged over 80 symbols to obtain reasonable MSE. It can be seen

On Synchronisation of ISS-OFDM Signals

115

that the proposed SCO estimator outperforms the classical approach. However, in OFDM-scenario MSE is usually lower by several orders of magnitude. It can be explained by ICI introduced by fractional time shift described in Sect. 1. The optimal parameters of averaging were used in a simulation to evaluate the performance of the entire system. The results of final simulation together with theoretical curves are presented in Fig. 7. Simulation data lay closer to theoretical boundary as SNR increases. It is explained by high error probability of synchronisation algorithms at low SNRs, as the averaging parameter was optimsed for SNRs corresponding to acceptable BER only. It can be seen that the system with the proposed SCO estimator performs better than the one with classical estimator, as expected. It means that time and frequency diversity present in ISS-OFDM system give a potential for robust synchronisation algorithms.

5

Conclusion

In this article synchronisation algorithms for ISS-OFDM signals were discussed for the first time. The effect of sampling clock offset on demodulated constellations was studied. A novel robust sampling clock offset tracking scheme was proposed and compared with an approach which is classical in OFDM systems. Simulation proved the novel SCO estimator to be more robust to Gaussian noise. It turned out that cyclic shift compensation is quite a difficult task in ISSOFDM systems. The shift causes interference between subcarriers if it is not an integer of time sample. Parallel FFT-demodulation scheme should be modified to perform compensation of arbitrary cyclic shift. Robust fine time-domain ISS-OFDM tracker was introduced to track the symbol “drifting” caused by SCO and to estimate the part of cyclic shift which is an integer of time sample. The entire ISS-OFDM communication system model was simulated. In particular, it was shown that with 162 subcarriers presented synchronisations algorithms can operate at SNR as low as 1 dB, with the system keeping the bit error rate at a value of 10−5 . The proposed algorithms scale in the number of subcarriers and the scaled system can perform even at lower SNR values. The major drawback of the study is that it does not consider CFO. CFO and SCO should be estimated jointly and the coupling between them should be studied. CFO may also degrade the performance of time-domain synchronisation and SCO tracker. Moreover, only AWGN model was used without any consideration of fading. The robustness is expected to deteriorate in fading environment. Furthermore, it is not evident how to perform efficient channel estimation in case of ISS-OFDM. Additional research is needed to determine whether the proposed alogrithms are suitable for fading channels.

116

S. Dorokhin

References 1. Fernandez-Getino Garcia, M.J., Paez-Borrallo, J.M., Zazo, S.: DFT-based channel estimation in 2D-pilot-symbol-aided OFDM wireless systems. In: Proceedings of IEEE VTS 53rd Vehicular Technology Conference, Spring 2001. (Cat. No.01CH37202), Vol. 2, pp. 810–814 (2001) 2. Jung, Y., Kim, J., You, Y.: Complexity efficient least squares estimation of frequency offsets for DVB-C2 OFDM systems. IEEE Access 6, 35165–35170 (2018) 3. Tu, P., Huang, X., Dutkiewicz, E.: Diversity performance of interleaved spread spectrum OFDM signals over frequency selective multipath fading channels. In: 2007 International Symposium on Communications and Information Technologies, pp. 184–189 (2007) 4. Tu, P., Huang, X., Dutkiewicz, E.: Peak-to-average power ratio performance of interleaved spread spectrum OFDM signals. In: 2007 International Symposium on Communications and Information Technologies, pp. 82–86 (2007) 5. Qin, D., Ma, L,, Wang, E., Ma, H., Ding, Q.: An interference suppression mechanism for WSN. In: Proceedings of 2013 International Conference on Sensor Network Security Technology and Privacy Communication System, pp. 28–33 (2013) 6. Schmidl, T.M., Cox, D.C.: Robust frequency and timing synchronization for OFDM. IEEE Trans. Commun. 45(12), 1613–1621 (1997) 7. Speth, M., Fechtel, S., Fock, G., Meyr, H.: Optimum receiver design for OFDMbased broadband transmission. ii. a case study. IEEE Trans. Commun. 49(4), 571–578 (2001) 8. Tu, P., Huang, X., Dutkiewicz, E.: A novel approach of spreading spectrum in OFDM systems. In: 2006 International Symposium on Communications and Information Technologies, pp. 487–491 (2006) 9. Tu, P., Huang, X., Dutkiewicz, E.: Subband adaptive filtering for efficient spectrum utilization in cognitive radios. In: 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008), pp. 1–4 (2008) 10. van de Beek, J., Sandell, M., Isaksson, M., Ola Borjesson, P.: Low-complex frame synchronization in OFDM systems. In: Proceedings of ICUPC 1995 - 4th IEEE International Conference on Universal Personal Communications, pp. 982–986 (1995) 11. Wu, J., Chen, Y., Zeng, X., Min, H.: Robust timing and frequency synchronization scheme for DTMB system. IEEE Trans. Consum. Electron. 53(4), 1348–1352 (2007)

Reserve Navigation System of Tether Powered Unmanned Aerial Platform in Conditions of Turbulent Atmosphere V. M. Vishnevsky1(B) , E. A. Mikhailov2 , and Nguyen Duy Phuong3 1

V. A. Trapeznikov Institute of Control Sciences of Russian Academy of Sciences, 65 Profsoyuznaya Street, Moscow 117997, Russia [email protected] 2 M. V. Lomonosov Moscow State University, 1 Leninskie gori, Moscow 119991, Russia [email protected] 3 Moscow Institute of Physics and Technology (National Research University), 9 Institutskiy per., Dolgoprudny, Moscow Region 141701, Russia [email protected]

Abstract. Unmanned aerial vehicles play a very important role in different technical problems. They can take photographs of the area, track forest fires, control offenses and be useful in another fields. Nowadays tethered high-altitude platforms have a particular interest. They have a number of advantages over autonomous devices. For example, they can work for a sufficiently long time and do not depend on the limited resources of batteries. This allows them to be used as transmitters for mobile phones and for other purposes where it is impossible to use autonomous unmanned platforms. In addition, they can carry a much higher load and have a higher power. However, there are some problems connected with navigation of the platform. The wind can change the location of the platform, which should be corrected. The coordinates of unmanned aerial vehicles are usually found using GPS or GLONASS systems. Unfortunately, the signal can be quite weak in some areas, so it is necessary to take the reserve navigation system, which will be connected with beacons located on the ground. In this work we present the idea of system of navigation of the tethered platform, which takes into account its main features and can give us the opportunity to stabilize the location of the vehicle. We give the main formulaes for the coordinates and estimate typical mistakes while measuring them. Keywords: Unmanned aerial vehicles platform

1

· Navigation system · Tethered

Introduction

Unmanned aerial vehicles have recently become widespread in a variety of industries. They are used for the purpose of photographing and filming, to control The reported study was funded by RFBR, project number 19-29-06043. c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 117–128, 2020. https://doi.org/10.1007/978-3-030-66242-4_10

118

V. M. Vishnevsky et al.

various offenses. Such devices can help receive information about forest fires and other emergencies. As a rule, unmanned devices are autonomous, and the engines located on board are powered by batteries. This approach has several advantages, but at the same time creates a number of problems. So, the flight time of the drone turns out to be significantly limited due to the not very large battery life. It also turns out that the transported cargo also has significant weight restrictions - engines powered by batteries cannot have a significant mass. A possible increase in battery capacity will naturally lead to an increase in the mass of the copter and therefore is not a solution to the problem. All this makes it impossible to use autonomous unmanned platforms to perform a number of tasks that require long-term stay in the air and the use of complex and heavy equipment on board. One of the possible methods for solving emerging problems is associated with the use of tethered high-altitude unmanned platforms [1–4]. They work by using a cable-rope that connects them to the ground station. The ground station can be stationary or located on a car (in the event that the mobility of the used complex is required). It contains the equipment that is associated with the control of the copter. The cable must be sufficiently strong and serve both for signal transmission and for stabilizing the position of the drone. Existing developments make it possible to transmit power up to 15 kW by cable. This makes it possible to place on the unmanned platform both powerful enough engines (this allows to lift a large payload), and serious attachments that consume a large amount of electricity. Usually, the operating time of such a device is practically unlimited. Thus, tethered high-rise platforms can be used for a large number of tasks, where their autonomous counterparts are not applicable. So, they can be used to provide mobile communication in the event of a breakdown of towers with transmitters. The tethered platform can also be used to “distribute” high-speed internet at public events. Also, tethered platforms can be more effectively used to control various offenses. (The experience of the coronavirus epidemic has shown that in some cases strict control over the movement of citizens under quarantine conditions is necessary.) In addition, tethered high-altitude platforms can be used to control the border. At the same time, despite a number of obvious advantages, tethered platforms also have a number of problems. The first of these is their stability under the influence of wind loads. In case of calm weather, the aircraft is at a given point above the base station. At the same time, the presence of wind can significantly shift its position relative to the required point. This process should be carefully considered. This requires careful consideration of the equations of motion for different parts of the cable. The equations that can be obtained in this case turn out to be rather complicated for an analytical solution, and require the use of numerical methods. In this paper, we briefly describe the main methods for studying the corresponding models. Another, no less significant problem, is that almost any unmanned platform is oriented in space using a satellite navigation system (GPS or GLONASS). A tethered platform is no exception in this case - in modern conditions it turns

Reserve Navigation System of Tether Powered Unmanned Aerial Platform

119

out to be quite effective, especially in the case of densely populated areas, where we can talk about a fairly good signal reception quality. At the same time, it should be noted that the guaranteed error in determining the coordinates using only data received from the satellite is within a few meters [5]. Typically, it can be improved with ground base stations. They can improve the accuracy of determining coordinates a few tens of kilometers from their location. For this reason, they are located in places where navigation system services are in high demand. At the same time, if we are talking about sparsely populated regions, where the signal level is noticeably lower, the accuracy of determining the coordinates also deteriorates significantly. In addition, deliberate attempts to jam the signal of the satellite navigation system cannot be ruled out. All this puts us in front of the need to create a duplicate navigation system that would allow the device to navigate in space even in the absence of an acceptable signal quality. If we talk about the existing experience in creating backup navigation systems for unmanned vehicles, then we can distinguish a number of approaches that were used primarily for the needs of autonomous devices. Nevertheless, we can say that the fundamental points in this case will differ little from what is the case for tethered unmanned platforms. Basically, all existing methods, one way or another, are reduced to one of four approaches [6]. The first approach refers to the so-called inertial navigation system [6]. The device has IMU sensors that can measure the acceleration of the device, as well as the change in the direction of its movement. Thus, it is possible to obtain the dependence of the acceleration components of the quadcopter on time. They can be integrated - and then we get the dependence of the velocity components on time. After integrating the velocity, it is possible to obtain the dependence of the coordinates on time. This method is quite simple to realize, which is its obvious advantage. At the same time, a significant drawback is that the integration must be performed numerically using the equipment on board the quadcopter. Unfortunately, any of the numerical methods has a certain error, which will only grow with time. Thus, if we are talking about tethered high-altitude unmanned platforms, which should work for a sufficiently long time, this method can hardly be considered suitable. During the operation of the device, the error will surely reach unacceptable values. The second approach uses what is called a visual navigation system [6]. It is connected with the placement of a video camera on board the high-altitude platform. It takes pictures of the surrounding area, fixes the location of the main buildings, features of the relief and objects. After that, using machine learning methods and a special computer program, a map of the area over which the device is moving is built. After the device has been trained, it can independently move over a given area and navigate using the camera mentioned above. This method is quite promising for autonomous platforms that move over large enough territories. At the same time, if we are talking about tethered platforms, then their “habitat” is rather small. For this reason, there is no need to implement a

120

V. M. Vishnevsky et al.

rather complex visual navigation system, and it makes sense to use much simpler methods and approaches. The third approach involves the use of a radar navigation system [6]. A radar is placed on board the unmanned flying platform, which can both emit and receive radio waves. By the time that elapsed from the moment the waves were emitted to the reception of the reflected wave, it is possible to determine the distance from the radar to a certain object. As such items, you can use special marks that can be placed on the earth’s surface. One of the most obvious advantages of this method is the fact that it is practically independent of weather conditions. It seems to us that such an approach is quite promising from the point of view of application for unmanned high-altitude platforms. The fourth approach is related to the so-called laser navigation [6]. Lasers can be installed on the unmanned high-altitude platform, which will emit corresponding beams. On the ground, in the same way as in the case of the “radar” approach, it is possible to set marks (where mirrors can play this role). By measuring the distances from the device to them, it is possible to determine mathematically the distance to the unmanned platform. It seems to us that this method also has a number of significant advantages from the standpoint of application for tethered unmanned platforms. It makes sense to mention the experience of predecessors in this area. Thus, Tordesillas proposes the joint use of both inertial navigation and visual navigation [16]. The authors propose the FASTER system, which uses mathematical methods that make it possible to improve the accuracy of calculating coordinates. Their work presents the simulation of the movement of a quadcopter in the forest. In addition, the authors of this work carried out experiments on the operation of the quadrocopter in a room where the researchers placed artificial obstacles that the device learned to fly around.

Fig. 1. A typical scheme of the unmanned aerial vehicle.

Reserve Navigation System of Tether Powered Unmanned Aerial Platform

121

Oleinikova et al. [7] discusses the use of a visual navigation system for quadrocopters. At the beginning of operation, the device takes pictures of the earth’s surface and creates a map of the territory in its memory. After that, he is quite successful in using it. The authors conducted a study of the efficiency of the apparatus in a variety of landscapes, from urban development to garbage dumps. The device is also successfully oriented when flying indoors. Kumar [8] proposes the use of laser navigation in combination with inertial sensors on unmanned aerial vehicles. This makes it possible to efficiently calculate its coordinates in various situations. Different authors describe the advantages of using radars for navigation of unmanned platforms. Quist and Beard [9,10] show the robustness of such methods both using the mathematical modeling of the flight and the real tests. Lindstrom with co-authors [11] compare the usage of radars and the visual navigation. They come to the conclusion that the radar navigation is much more effective. The navigation based on using synthetic aperture radars has also been described in detail in works of Christensen et al. [12], Reid and Ash [13] and other groups. The works listed above are for autonomous unmanned aerial platforms. If we talk about tethered unmanned platforms, then we can mention the work of Dowling [14]. It is associated with devices that move indoors. So, they can be used, for example, in the machine rooms of industrial enterprises. They are navigated by a laser system. Laser beams are reflected from walls and objects, due to which a room map is built in the device’s memory. Then, according to these data, the device successfully flies around obstacles. Similar methods were also used in Zeng’s work [15], where the results were refined using visual navigation methods. Summarizing the results given above, we can say that for tethered highaltitude platforms, the use of a laser navigation system is most effective. We discuss this approach in detail below.

2

Main Laws for the Motion of the Tethered Aerial Vehicle

Here we describe the main approaches of the modeling the tethered vehicle (Fig. 1). Here we can introduce the following equations [3]: dx1 = ρg; dz dx2 = x3 ; dz    1/2 ρgx3 1 + x23 + AV 2 1 + x23 dx3 =− ; dz x1  1/2 dx4 = 1 + x23 ; dz

122

V. M. Vishnevsky et al.

Fig. 2. Elongation in connection with velocity of the wind. Rectangles show V = 0 and rounds show V = 10 m/s.

where z is the distance from the earth surface, x1 is the force pulling force, x2 is the distance from the vertical line, x3 is the tangent of the angle of inclination, x4 is the length of the cable. Also we should say that ρ is the linear density of the cable, g is the acceleration of gravity, A is the drag coefficient and V is the velocity of the wind (Fig. 1). Table 1. Elongation of the cable for different velocity of the wind. V , m/s x2 (zmax ) = 0 x2 (zmax ) = 5 m x2 (zmax ) = 10 m x2 (zmax ) = 15 m 0

0

0

0

0

2

0.001

0.004

0.008

0.014

4

0.018

0.027

0.036

0.048

6

0.093

0.111

0.129

0.150

8

0.293

0.324

0.355

0.389

10

0.716

0.763

0.812

0.861

The equations are solved numerically using Runge – Kutta fourth order method [3]. This method is quite stable and gives us an opportunity to solve the equations quite precisely. One of the main questions is connected with the full length of the cable: L = x4 (hmax ). Also it is interesting to count the value of the distance from the ground station and the unmanned aerial vehicle. If the distance from the vertical line at

Reserve Navigation System of Tether Powered Unmanned Aerial Platform

123

the highest point zmax is x2 (zmax ), we can find it as:  2 1/2 l1 = zmax + x22 (zmax ) . To find the difference between these values we can introduce the parameter: δl = L − l1 . For example, we can calculate the values for Δl for linear density ρ = 2 0.04 kg/m and drag coefficient A = 0.004 kg/m , L = 150 m. It could be interesting to model this process for different velocity of the wind. We have found the elongation for different cases (Table 1 and Fig. 2) .

Fig. 3. Location of the radio beacons.

The connection between velocity and the elongation can be found as: δl ≈ αV 4 , where the coefficient α depends on the parameter x2 (Table 2). It can be seen that the value of the elongation is much smaller than the length of the cable. So, we can approximately assume that the distance from the basic station is equal to the length of the cable.

124

V. M. Vishnevsky et al. Table 2. Coefficient α for different x2 . x2 , m α, s4 /m3 0

3

0.092

5

0.095

10

0.096

15

0.098

Coordinates of the Vehicle

The coordinates of the tethered unmanned aerial vehicle can be found using the radio beacons located in points M2 (− a2 , b, 0) and M3 ( a2 , b, 0). The third point is connected with the point (0, 0, 0) (Fig. 3). We can assume that the length of the cable is connected with the coordinates of the vehicle: l12 = x2 + y 2 + z 2 . The distances l2 and l3 from the beacons to the object can be found by the following formulaes:  a 2 2 l22 = y + + (x − b) + z 2 ; 2  a 2 2 + (x − b) + z 2 . l32 = y − 2 We can obtain the height of the platform as: z 2 = l12 − x2 − y 2 . So the distances from the beacons can be rewritten:  a 2 2 + (x − b) + l12 − x2 − y 2 ; l22 = y + 2  a 2 2 + (x − b) + l12 − x2 − y 2 . l32 = y − 2 We can subtract the second equation from the first one:  a 2  a 2 l22 − l32 = y + − y− . 2 2 This leads us to the expression for the y-coordinate: y=

l22 − l32 . 2a

The equation for l2 can be rewritten, if we expand the brackets: −2xb + b2 = l22 − l12 − ay −

a2 . 4

Reserve Navigation System of Tether Powered Unmanned Aerial Platform

125

If we take into account the formulae for y, we shall obtain that: −2xb + b2 =

a2 l22 − 2l12 + l32 − . 2 4

For coordinate x we can take: x=

l2 − 2l12 + l32 b a2 + − 2 . 2 8b 2b

The equation for l1 , it can be rewritten:  l12

=

b a2 l2 − 2l12 + l32 + − 2 2 8b 2b



2 +

l22 − l32 2a

2 + z2.

For the height of the unmanned aerial vehicle we shall obtain the following expression:   2  2 2 b a2 l2 − l32 l22 − 2l12 + l32 2 + − − . z = l1 − 2 8b 2b 2a As it was said in previous paragraph, the length if the cable can differ from the distance from the ground station. So it is necessary to estimate the mistake connected with the uncertainty for the distances. If we assume the mistakes independent, the mistake for x will be the following:    2 2 2 ∂x ∂x ∂x 2 2 Δl1 + Δl2 + Δl32 . Δx = ∂l1 ∂l2 ∂l3 The partial derivatives can be found as: ∂x 2l1 ; = ∂l1 b ∂x l2 =− ; ∂l2 b ∂x l3 =− . ∂l3 b So the mistake for the parameter is: 4l12 2 l22 2 l32 2 Δx = Δl + Δl + Δl . b2 1 b2 2 b2 3 In a similar way, we can write the formulae for the mistake for y:    2 2 2 ∂y ∂y ∂y 2 2 Δl1 + Δl2 + Δl32 . Δy = ∂l1 ∂l2 ∂l3

126

V. M. Vishnevsky et al.

The partial derivatives will be: ∂y = 0; ∂l1 ∂y l2 = ; ∂l2 a ∂y l3 =− . ∂l3 a For the mistake we shall have: Δy =

l22 2 l32 2 Δl + Δl . a2 2 a2 3

For the z-coordinate we will have:    2 2 2 ∂z ∂z ∂z 2 2 Δz = Δl1 + Δl2 + Δl32 . ∂l1 ∂l2 ∂l3 As for the derivatives, we have:  2  l1 a 2 2 2 b2 2 + 2l2 − 4l1 + 2l3 ∂z 1 = 2  2 2  2 ;  ∂l1 2 l22 −2l12 +l32 l −l b a2 2 l1 − 2 + 8b − − 22a 3 2b   2  2  1 a 1 2 2 2 2 1 + − l − l + 2l − l − l l 2 1 3 2 3 b2 4 a2 ∂z 1 2 = ;     2 2 ∂l2 2 l22 −2l12 +l32 l22 −l32 b a2 2 l1 − 2 + 8b − − 2a 2b   2  2  1 a 1 2 2 2 2 1 + + l − l + 2l − l − l l 2 2 2 2 1 3 2 3 b 4 a ∂z 1 = .     2 2 ∂l3 2 2 l2 −2l2 +l2 l2 −l2 l12 − 2b + a8b − 2 2b1 3 − 22a 3 For the value of the mistake we will have: Δz = 2 l12 −



1 b 2

a2 8b



l22 −2l12 +l32 2b

2





l22 −l32 2a

2

2 a2 + 2l22 − 4l12 + 2l32 2   2    2 2 1 a 1  − l22 + 2l12 − l32 − 2 l22 − l32 +l22 1 + 2 Δl2 b 4 a      2 2 1/2 1 a2 1 2 2 2 2 2 2 − l2 + 2l1 − l3 + 2 l2 − l3 +l3 1 + 2 Δl3 ) . b 4 a ×(

l12 b4



+

Reserve Navigation System of Tether Powered Unmanned Aerial Platform

127

The expressions are quite complicated, so it is necessary to take some simplifications. For example, to estimate the mistakes, we can take the maximum values of the distances and the mistakes: Δl = max(Δl1 , Δl2 , Δl3 ); l = max(l1 , l2 , l3 ). So, the mistakes can be estimated by formulaes: √ l 6 Δl; Δx = b √ l 2 Δy = Δl; a   2    a2 + 8l2 lΔl 1 a2 + 8l2 l2 Δz = +2 1+ + 2 . 2z 2b2 2 2b2 a It can be assumed that the mistake is mainly connected with the mistake in measuring the length of the cable. So, we can estimate it as: Δl ≈ δl = αV 4 . For wind velocity V = 10 km/s we obtain Δl ≈ 0.7 m. If we take the values z = 150 m, l = 150 m, a = 400 m and b = 300 m : Δx =

150 m · 2.45 · 0.7 m = 0.9 m; 300 m

150 m · 1.41 · 0.7 m = 0.4 m; 400 m 150 m Δz = 2 · 150 m  2 2 (400 m) + 8(150 m)2 ×( 2(300 m)2     1 (400 m)2 + 8(150 m)2 (150 m)2 1/2 2 1+ + ) · 0.7 m = 1 m 2 2(300 m)2 (400 m)2 Δy =

So, it can be seen, that the mistake is quite moderate and it is comparable with the one for the GPS/GLONASS.

4

Conclusion

We have described the reserve navigation system for the tethered unmanned aerial vehicles. It can be based on radio beacons or on the laser navigation. We have shown that here we can take only two ground beacons and use the length of the cable as a third distance. We have estimated possible mistakes connected with the wind and another factors. It has been shown that the mistakes are quite comparable with the ones for the space navigation system.

128

V. M. Vishnevsky et al.

References 1. Kiribayashi, S., Ashizawa, J., Nagatani, K.: Modeling and design of tether powered multicopter. In: 2015 IEEE International Symposium on Safety, Security, and Rescue Robotics (2015) 2. Vishnevsky, V., Tereschenko, B., Tumchenok, D., Shirvanyan, A.: Optimal method for uplink transfer of power and the design of high-voltage cable for tethered high-altitude unmanned telecommunication platforms. In: Vishnevskiy, V.M., Samouylov, K.E., Kozyrev, D.V. (eds.) DCCN 2017. CCIS, vol. 700, pp. 240–247. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-66836-9 20 3. Vishnevsky, V.M., Mikhailov, E.A., Tumchenok, D.A., Shirvanyan, A.M.: Mathematical model of the operation of a tethered unmanned platform under wind loading. Math.l Models Comput. Simul. 12, 492–502 (2020). https://doi.org/10. 1134/S2070048220040201 4. Kozyrev, D.V., Phuong, N.D., Houankpo, H.G.K., Sokolov, A.: Reliability evaluation of a hexacopter-based flight module of a tethered unmanned high-altitude platform. In: Vishnevskiy, V.M., Samouylov, K.E., Kozyrev, D.V. (eds.) DCCN 2019. CCIS, vol. 1141, pp. 646–656. Springer, Cham (2019). https://doi.org/10. 1007/978-3-030-36625-4 52 5. Grimes, J.G.: Global positioning system standard positioning service performance standard (2008) 6. Mohamed, S.A.S., Haghbayan, M.-H., Westerlund, T., Heikkonen, J., Tenhuhen, H., Plosila, J.: A survey on odometry for autonomous navigation systems. IEEE Access 7, 97466 (2019) 7. Oleinikova, H., et al.: An open-source system for vision-based micro-aerial vehicle mapping, planning, and flight in cluttered environments. arXiv:1812.03892 (2018) 8. Kumar, G.A., Patil, A.K., Patil, R., Park, S.S., Chai, Y.H.: A LiDAR and IMU integrated indoor navigation system for UAVs and its application in real-time pipeline classification. Sensors (Basel) 17, 1268 (2017) 9. Quist, E.B., Beard, R.W.: Radar odometry on small unmanned aircraft. In: AIAA Guidance, Navigation, and Control (GNC) Conference, 4698 (2013) 10. Quist, E.B., Beard, R.: Radar odometry on fixed-wing small unmanned aircraft. IEEE Trans. Aerosp. Electron. Syst. 52, 396 (2016) 11. Lindstrom, C., Christensen, R.S., Gunther, J.H.: An investigation of GPS-denied navigation using airborne radar telemetry. In: IEEE/ION Position, Location and Navigation Symposium, vol. 168 (2020) 12. Christensen, R. S., Gunther, J., Long, D.: Toward GPS-denied navigation utilizing back projection-based synthetic aperture radar imagery. In: Proceedings of the ION 2019 Pacific PNT Meeting, p. 108 (2019) 13. Reid, Z., Ash, J.N.: Leveraging 3D models for SAR-based navigation in GPSdenied environments. In: Algorithms for Synthetic Aperture Radar Imagery XXV, vol. 10647, 106470H (2018) 14. Dowling, L., et al.: Accurate indoor mapping using an autonomous unmanned aerial vehicle. arXiv: 1808.01940 (2018) 15. Zeng, Q., Wang, Y., Liu, J., Chen, R., Deng, X.: Integrating vision and laser pont for outdoor UAV SLAM. In: Ubiquintous Positioning Indoor Navigation Based Service, vol. 170 (2014) 16. Tordesillas, J., Lopez, B.T., Everett, M., How, J.P.: FASTER: Fast and Safe Trajectory Planner for Flights in Unknown Environments arXiv: 2001.04420 (2020)

Teleportation of the Bell States on IBM Q Computers Under Their Hardware Errors V. P. Gerdt1,2,3

and E. A. Kotkova1,3(B)

1

2

Joint Institute for Nuclear Research, Dubna 141980, Russian Federation [email protected], [email protected] Peoples’ Friendship University of Russia, Moscow 117198, Russian Federation 3 Dubna State University, Dubna 141982, Russian Federation Abstract. We present and analyze our experimental results on teleportation of two-qubit maximally entangled Bell states on the NISQ (Noisy Intermediate-Scale Quantum) five-qubit processors IBM Q Burlington, Essex, London, Ourense, Rome, Santiago, Vigo and Yorktown. The main obstacle in practical implementation of quantum algorithms on the NISQ computers is caused by hardware errors which depend on the depth of the underlying circuit and its gates. We suggest several modifications of the original teleportation protocol to optimize the depths of its circuit and the connectivity of hardware qubits. In addition, we compare the dynamics of the output probabilities on the processor IBM Q Yorktown within one and a half years of our use of this processor. They clearly demonstrate the significant progress made in the hardware of quantum computers. Keywords: Quantum information · Quantum communication Quantum teleportation · Bell states · Qiskit

1

·

Introduction

The superposition and entanglement of quantum states are the main resources of quantum computation, information and communication [1]. Computational cost of quantum algorithms that do not rest on entanglement appears to scale exponentially with the size of the input problem and often allow rather efficient simulation on classical higher performance computers. An example of promising entangled - based algorithm oriented to NISQ computers is the variational quantum eigensolver (VQE) proposed in [2] and intensively studied in computational quantum chemistry (see the review [3] and its bibliography). The VQE is a hybrid quantum-classical algorithm whose quantum part serves for a state preparation and measurement, whereas a classical computer provides processing the measurement results. The key part of VQE are “entanglers”, two-qubit entangling gates (cf. [4]). The following circuit (Fig. 1), taken from [5], is an example of such entangler. This work was supported by the Grant from the Ministry of Science and Higher Education of the Russian Federation (Agreement No. 075-10-2020-117). c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 129–143, 2020. https://doi.org/10.1007/978-3-030-66242-4_11

130

V. P. Gerdt and E. A. Kotkova

Fig. 1. Entangler gate. a) Initial circuit, b) transpiled into quantum computer gates one

For the input 2-qubit state |00 and entangler parameters θ1 , θ2 , θ4 , θ5 = π/4, θ3 = π/6 its measurements results obtained on IBM Q Santiago and those on the “ideal” (i.e., computed with Qasm Simulator [6]) quantum computer (cf. Sect. 2.2) are given below (Fig. 2). As one can see, in spite of small depth of the entangler circuit the errors are quite notable, and their main source is the two-qubit CNOT gates.

Fig. 2. Results for entangler gate implementation on Qasm Simulator and IBM Q Santiago.

To investigate dependence of the resulting hardware errors on the structure of a circuit and connectivity of the qubits it uses, we consider the circuit (protocol) suggested in [7] for teleportation of the maximally entangled Bell states (Fig. 3). One-qubit quantum teleportation was first proposed by Bennett et al. in [8]. To teleport a two-qubit state of a quantum channel should consist of three or more qubits. One of the quantum states |GHZ [9]

or |W  [10]

1 |GHZ = √ (|000 + |111) 2

(1)

1 |W  = √ (|001 + |010 + |100), 3

(2)

belonging to different equivalence classes, is used for creating three-qubit quantum channels, depending on the chosen protocol. In [11,12], circuits using the state |W  are presented. The states belonging to the same equivalence class as

The Bell States Teleportation on IBM Q Computers

131

Fig. 3. Initial circuit of the two-qubit teleportation.

|GHZ are used in [13,14]. The four-qubit cluster state is used to teleport an arbitrary two-qubit state in IBM Quantum Experience [15] in [16]. Protocols for teleportation were also developed using other cluster states [17,18]. Below we present our results on implementation of the protocol [7] (see Fig. 3) of two-qubit quantum teleportation using |GHZ state on the 5-qubit IBM computers accessible via the cloud platform IBM Quantum Experience [15] and Qiskit framework [19]. All calculations were made within circuit model of computations [1]. We teleported the maximally entangled 2-qubit states known as the Bell (EPR) states (3) [20]. 1 |q0  = |x , |q1  = |y −→ |βxy  = √ (|0, y + (−1)x |1, 1 − y) , x, y ∈ {0, 1}. 2 (3) The composition of the paper is as follows. Section 2 provides an overview of 5-qubit IBM quantum computers used in our work. We discuss CNOT-gates construction between physically disconnected qubits in Sect. 3. The experimental realization of the teleportation protocol is also demonstrated there.

2

IBM Quantum Computers

Let’s briefly overview IBM quantum computers used in this paper. All IBM Q quantum computers are built using superconducting qubit technology [21]. IBM Q Yorktown has been accessible to users since 2017. It underwent a modification about a year ago: its error rates decreased and connections between qubits changed from unidirectional (Fig. 4a) to bi-directional (Fig. 4b). IBM Q Burlington, IBM Q Essex, IBM Q London, IBM Q Ourense and IBM Q Vigo have T-shaped architecture (Fig. 5). The third architecture (Fig. 6) is represented by IBM Q Rome and IBM Q Santiago.

132

V. P. Gerdt and E. A. Kotkova

Fig. 4. The connectivity of IBM Q Yorktown (a) before its modification, (b) actual version.

Fig. 5. T-shaped connection graph.

Fig. 6. Connection graph of IBM Q Rome and IBM Q Santiago.

Quantum volume [22] is a measure of quantum computer performance. It is equal to 8 for IBM Q Burlington, IBM Q Essex, IBM Q Ourense, and IBM Q Yorktown. IBM Q London and IBM Q Vigo have the quantum volume 16. Both IBM Q Rome and IBM Q Santiago have the quantum volume 32 [23]. But quantum volume of IBM Q Rome was calculated after the implementations under consideration. 2.1

Gates

The one-qubit gates used in the teleportation protocol are     1 1 1 01 , X=⊕= , H=√ 10 2 1 −1

(4)

The Bell States Teleportation on IBM Q Computers

133

and the 2-qubit control-⊕ (CNOT) gate. Before runnung a circuit on a device, they are transpiled by IBM into the set of the physical gates, which includes two-qubit CNOT gate and one-qubit parametrical ones  θ  iλ  θ  e cos  θ 2 iφ − sin  θ  2i(λ+φ) U 3(θ, φ, λ) = , θ, λ, φ ∈ [0, 2π], (5) sin 2 e cos 2 e π U 2(φ, λ) = U 3( , φ, λ) = 2



√1 √ iλ − exp 2 2 exp i(λ+φ) exp √ iφ √ 2 2



U 1(λ) = U 3(0, 0, λ) =

 ,

 1 0 . 0 exp iλ

(6)

(7)

We also used the SWAP gate SW AP (q0 , q1 ) = CN OT (q0 , q1 )CN OT (q1 , q0 )CN OT (q0 , q1 ),

(8)

which exchanges the states of qubits q0 and q1 , for providing CNOT gate between physically unconnected qubits, as discussed in the next section. 2.2

Sources of Errors

Consider the causes of errors in running quantum circuits on real quantum computers. One type of such errors occurs from “noise” in gates and the measurement operations. Due to peculiarities of the physical implementation of onequbit gates, the value of the U3 gate error is twice larger than the U2 error. U1, which changes the phase of the qubit, is performed in software, which affects the physical implementation of subsequent gates. Despite of the fact that a software implementation itself without physical effects on qubits should not lead to errors in quantum computations, errors in its application are still possible because of decoherence. Decoherence includes two processes: energy relaxation and dephasing. Energy relaxation means spontaneous transition of a qubit state from |1 to |0 and is characterized by time T1 . Dephasing is the destruction of the superposition state √ . Time T2 reflects both effects of energy relaxation and dephasing. like |0+|1 2 Since the teleported state is a superposition with equal weights, when it is measured in the classical basis, one of the states included in it is to be obtained with probability 0.5. A quantum computer runs a quantum circuit a finite number of times. So even with ideal computations the resulting probabilities will differ from the expected values. Figure 7a shows the resulting state of the qubits, to which |β00  is teleported, calculated using Statevector Simulator [24] without measurement implementation. Statevector Simulator performs single ideal run of a quantum circuit and returns the resulting state vector of the simulator. Results for 1024 shots of ideal implementation of the same circuit on Qasm Simulator [6] are shown in Fig. 7b.

134

V. P. Gerdt and E. A. Kotkova

Fig. 7. Results for |β00  teleportation on simulators. (a) One shot of ideal simulation without measurement, (b) ideal simulation on Qasm Simulator with measurement in classical basis. Shots = 1024.

3 3.1

Experimental Realization CNOT Gates Implementation

The scheme of qubit interconnections in the quantum teleportation protocol is presented in Fig. 8. As one can see from comparing it with any of the architectures from the previous section, some connections that are necessary for implementation are not available among the devices. All connections in IBM Q Yorktown before its modification were unidirectional, so we used a circuit with additional Hadamard gates (Fig. 9a) to change the direction of CNOT gates when necessary. Another problem is implementation of CNOT gates between physically unconnected qubits. In the IBM transpiler, this problem is solved by adding a SWAP gate between an auxiliary qubit and one of the pair of unconnected qubits (Fig. 9b). In some cases, this can lead to the fact that, as a result of applying the teleportation protocol, the state is sent to and received from the same qubit, which negates the very idea of the teleportation. To prevent this and minimize the number of auxiliary gates as much as possible, we combine this approach and the usage of circuits with the same number of CNOT gates but without swap of qubit states (Fig. 9c,d). 3.2

IBM Q Yorktown

In [25] we presented three implementations of the protocol on IBM Q Yorktown before modification of this computer. The correspondence of qubit numbers in the initial circuit to quantum computer qubits is shown in Table 1. After a certain modification of IBM Q Yorktown when all connections between qubits had become bidirectional, a reduction of implemented circuits depths became possible, since a program change of directions in some CNOT gates was no longer necessary. The depth (see [26]) of all circuits (without the measurement gates) decreased from 25 to 17 for |β00  and |β01  and from 26 to 18 for |β10  and |β11 . The initial and reduced versions of Circuit 1 are presented in Fig. 10.

The Bell States Teleportation on IBM Q Computers

135

Fig. 8. Qubit connections in the teleportation protocol

Fig. 9. CNOT implementation: (a) changing the direction; (b,c,d) CN OT (q0 , q2 ) with SWAP gate usage (b) and without it (c,d)

Fig. 10. Quantum Circuit 1 for teleportation of |β00  on IBM Q Yorktown a) initial version, b) reduced after the device modification Table 1. Matchings of the quantum algorithm qubits to the qubits of the IBM Q Yorktown. Qubit of the protocol Circuit 1 Circuit 2 Circuit 3 0

0

0

3

1

1

1

4

2

3

4

1

3

2

2

2

4

4

3

0

136

V. P. Gerdt and E. A. Kotkova

As one can see from the results shown in Fig. 11, the achieved error rates didn’t allow to detect the teleported state for any of Bell ones before the modification of IBM Q Yorktown. The probabilities of observing the “correct” results were higher than incorrect ones for the both original and modified versions of Circuit 1 after the device modification. Further increase of the gate and measurement errors led to incorrect results for |β00  and |β10  states. The changes in error rates of the device play a more crucial role in the quality of the implementation rather than the choice of the reduced or initial version of the circuit.

3.3

T-Shaped IBM Quantum Computers

When comparing the protocol qubit interconnections scheme with the devices’ architecture, one can see that, for minimization of auxiliary gates number, one has to assign qubit 3 of the algorithm scheme to qubit 1 of a quantum computer, which has the largest number of two-qubit connections. Qubit 2 of the protocol has two CNOT gates of multiplicity 2, so we should match it with the qubit 3 of the device and qubit 4 of the protocol with qubit 4 of the quantum computer. Thus, there are only two ordering options, presented in Table 2. Table 2. Correspondence of the qubit numeration in the initial circuit to those applied in its realizations on the T-shaped chips. Initial circuit 0 1 2 3 4 Circuit 1

0 2 3 1 4

Circuit 2

2 0 3 1 4

With any qubit numeration, we face the need to apply CNOT gate between device qubit 4 and either qubit 0 or qubit 2. Due to the absence of auxiliary qubit connected to both of them, we combine two approaches implementing SWAP gate between qubits 3 and 4 of the device. That is, SW AP (q2 , q4 ), where q2 , q4 are qubits of the protocol, is used at the place which is marked with the red line in the protocol circuit (Fig. 12). Since SW AP (q3 , q4 ) between qubits q3 and q4 of the computer is not repeated for the reverse exchange of states between the q3 and q4 qubits, as a result of the implementation of the quantum circuit, the state is transferred not to the q1 and q4 qubits of the quantum computer, but to the q1 and q3 , which corresponds to the q3 and q2 qubits of the algorithm. The obtained circuits with a depth (without measurement gates) of 20 for |β00  and |β01  teleportation and 21 for teleportation of |β10  and |β11  are presented in Fig. 13.

The Bell States Teleportation on IBM Q Computers

137

Fig. 11. Results for Circuit 1 for teleportation of the Bell states on the IBM Q Yorktown with readout in the classical basis. a) state |β00 , b) state |β01 , c) state |β10 , d) state |β11 .

As one can see from Fig. 14, the probability of obtaining “correct” results is higher than incorrect ones for all four Bell states for Circuit 1 implemented on the quantum computers IBM Q Essex, IBM Q Ourense and IBM Q Vigo. Similar, but slightly better for IBM Q Vigo and slightly worse for IBM Q Ourense results are

138

V. P. Gerdt and E. A. Kotkova

Fig. 12. The place of SW AP (q2 , q4 ) in the initial circuit.

Fig. 13. Circuit 1 (a) and Circuit 2 (b) for |β11  teleportation on the T-shaped devices.

achieved for Circuit 2 realization. None of the Bell states are teleported correctly by any of the circuits on IBM Q London. And in the IBM Q Burlington, for each of the circuits, only one of the Bell states is distinguishable from the results of measurements in the classical basis: |β11  for Circuit 1 and |β00  for Circuit 2. 3.4

IBM Q Rome and IBM Q Santiago

For the implementation on IBM Q Rome and IBM Q Santiago, it is not so obvious which correspondence should be between the qubits of the algorithm and the qubits of the computer, since in a quantum chip each qubit is connected to no more than two others (see Fig. 6). In this regard, let us consider for IBM Q Rome an implementation in which a protocol qubit corresponds to a quantum computer qubit with the same number. The same circuit is applied upside down on IBM Q Santiago, i.e., the protocol qubit q0 corresponds to the quantum computer qubit q4 , the algorithm qubit q1 to the device qubit q3 etc. Let’s take a look at the resulting circuit (Fig. 15). The Roman numerals indicate places that are needed to be given special attention:

The Bell States Teleportation on IBM Q Computers

139

Fig. 14. Results of Circuit 1 for teleportation of the Bell states on the T-shaped devices with readout in the classical basis. a) state |β00 , b) state |β01 , c) state |β10 , d) state |β11 .

140

V. P. Gerdt and E. A. Kotkova

I. The qubits q2 , q3 and q4 are prepared in the |GHZ state. Since the q2 , q4 qubits have no physical connection, to reduce the number of gates used, we choose as a control qubit not qubit q2 which corresponds to the ordering, but the qubit q3 connected to the two others. II. In accordance to the original circuit, it is necessary to apply the CN OT (q2 , q3 ) gate here, and then after the Hadamard gate the gate CN OT (q1 , q3 ) in which q1 and q3 are not physically connected. Therefore, after CN OT (q2 , q3 ), we use SW AP (q2 , q3 ), which exchanges the states of the q2 and q3 . As a result, CN OT (q1 , q2 ) is then used instead of CN OT (q1 , q3 ), and the quantum state teleports to the q2 , q4 qubits, and not to q3 , q4 . After reduction of the number of gates, the application of CN OT (q2 , q3 ) and then the following SW AP (q2 , q3 ) is converted to the sequence CN OT (q3 , q2 ), CN OT (q2 , q3 ). III. In the original circuit there is gate CN OT (q2 , q4 ), which after the transformation II becomes CN OT (q3 , q4 ) of the adapted circuit. However, further in the original scheme there are gates CN OT (q4 , q3 ) and CN OT (q4 , q0 ), which follow CN OT (q2 , q4 ), which correspond to the CNOT gates of the adapted algorithm and consists of physically unconnected computer qubits q4 , q2 in the first case and of q4 , q0 in the second one. By this reason, we apply CN OT (q4 , q3 ) and then CN OT (q3 , q4 ), which corresponds to the sequence CN OT (q3 , q4 ), SW AP (q3 , q4 ). There is a swap of quantum states between the q3 , q4 qubits of the quantum computer. As a result, the original Bell state is teleported to qubits q2 , q3 , and not to q2 , q4 . IV. CN OT (q0 , q3 ) and CN OT (q4 , q0 ) follow the above described gate CN OT (q4 , q3 ) in the original circuit. They correspond to CN OT (q0 , q2 ) and CN OT (q3 , q0 ) in the adapted scheme. Therefore, to reduce the number of auxiliary gates, we apply SW AP (q0 , q1 ). V. We realize CN OT (q3 , q1 ) by means of four CNOT gates as shown in Fig. 15. The results for realization on IBM Q Rome and IBM Q Santiago are shown in Fig. 16. The probabilities of observing “correct” results are higher than those of incorrect ones for all Bell states on the both devices. Moreover, the fidelity on IBM Q Santiago was the highest one among all devices we considered.

Fig. 15. Teleportation circuit on IBM Q Rome.

The Bell States Teleportation on IBM Q Computers

|β00

|β01

|β10

|β11

141

Fig. 16. Results for IBM Q Rome and IBM Q Santiago.

4

Conclusion

The results for implementations of the teleportation of Bell states on five-qubit IBM Q quantum computers with three different connection graphs are presented in Fig. 11, 14, 16. The fact that probabilities of detecting “correct” results for all Bell states were higher than incorrect ones on the devices including IBM Q Santiago, IBM Q Rome, IBM Q Vigo, IBM Q Ourense, and IBM Q Essex, which became publically accessible in the last years, shows the technical improvement achieved by IBM. Nevertheless, errors make recognition of transported states impossible for teleportation of all or the majority of Bell states on the T-shaped computers IBM Q Burlington and IBM Q London. The results for IBM Q Yorktown became better than those obtained in our previous study [25], but some of the Bell states may still be indistinguishable from the measurement results depending on the current device’s calibrations. Thus, further decreasing of error rates is needed. It can be done using the error correction codes [27] and the quantum control [28] to suppress errors [29]. As part of this work, a set of programs in Python was written using the Qiskit framework to implement the quantum teleportation protocol on specific quantum computers.

142

V. P. Gerdt and E. A. Kotkova

Acknowledgements. The authors are deeply grateful to Michael Biercuk, Michael Hush and Andre Carvalho for informing us about error suppression research at Q-CTRL (https://docs.q-ctrl.com/).

References 1. Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. 10th Anniversary Edition. Cambridge University Press, Cambridge (2010) 2. Peruzzo, A., et al.: A variational eigenvalue solver on a quantum processor. Nat. Commun. 5, 4213 (2014) 3. McArdle, S., Endo, S.: Quantum computational chemistry. Rev. Mod. Phys. 92, 015003 (2020) 4. Kandala, A., et al.: Hardware-efficient variational quantum eigensolver for small molecules and quantum magnets. Nature 549, 242–246 (2017) 5. Uvarov, A.V., Kardashin, A.S., Biamonte, J.D.: Mashine learning phase transitions with a quantum processor. Phys. Rev. A. 102, 012415 (2020) 6. QasmSimulator – Qiskit 0.21.0 documentation, https://qiskit.org/ documentation/stubs/qiskit.providers.aer.QasmSimulator.html#qiskit.providers. aer.QasmSimulator. Accessed 15 Sept 2020 7. Gorbachev, V.N., Trubilko, A.I.: Quantum teleportation of an Einstein-PodolskyRosen pair using an entanglement three-particle state. J. Exper. Theor. Phys. 118(5), 1036–1040 (2000) 8. Bennett, C.H., Brassard, G., Crepeau, C., et al.: Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys. Rev. Lett. 70, 1895–1899 (1993) 9. Greenberger, D., Horne, M., Zeilinger, A.: Similarities and differences between two-particle and three-particle interference. Fortschr. Phys. 48(4), 243–252 (2000) 10. D¨ ur, W., Vidal, G., Cirac, J.I.: Three qubits can be entangled in two inequivalent ways. Phys. Rev. A 62, 062314–062325 (2000) 11. Cao, Z.-L., Song, W.: Teleportation of a two-particle entangled state via W class states. Physica A: Stat. Mechanics Appl. 347, 177–183 (2005) 12. Joo, J., Park, Y.-J., Oh, S., Kim, J.: Quantum teleportation via a W state. New J. Phys. 5, 136.1–136.9 (2003) 13. Ghosh, S., Kar, G., Roy, A., Sarkar, D. et al.: Entanglement teleportation through GHZ-class states. New J. Phys. 4, 48.1–48.9. (2002) 14. Tsai, C., Hwang, T.: Teleportation of a Pure EPR State via GHZ-like State. Int. J. Theor. Phys. 49, 1969–1975 (2010) 15. IBM Quantum Experience, https://www.ibm.com/quantum-computing/ experience/. Accessed 20 Sept 2020 16. Rajiuddin, S., Baishya, A., Behera, B.K., Panigrahi, P.K.: Experimental realization of quantum teleportation of an arbitrary two-qubit state using a four-qubit cluster state. Quantum Inf. Process. 19(3), 1–13 (2020). https://doi.org/10.1007/s11128020-2586-x 17. Li, D.-C., Cao, Z.-L.: Teleportation of two-particle entangled state via cluster state. Commun. Theor. Phys. 47(3), 464–466 (2007) 18. Liu, Z., Zhou, L.: Quantum teleportation of a three-qubit state using a five-qubit cluster state. Int. J. Theor. Phys. 53(12), 4079–4082 (2014). https://doi.org/10. 1007/s10773-014-2158-x 19. Qiskit, https://qiskit.org/. Accessed 20 Sept 2020

The Bell States Teleportation on IBM Q Computers

143

20. Sutor, R.S.: Dancing with Qubits: How quantum computing works and how it can change the world. Packt (2019) 21. Kjaergaard, M., et al.: Superconducting qubits: current state of play. Ann. Rev. Condensed Matter Phys. 11, 369–395 (2020) 22. Cross, A.W., et al.: Validating quantum computers using randomized model circuits. Phys. Rev. A. 100(3), 032328 (2019) 23. IBM Quantum Experience - Docs and Resources, https://quantum-computing. ibm.com/docs/manage/backends/. Accessed 15 Sept 2020 24. StatevectorSimulator – Qiskit 0.21.0 documentation, https://qiskit.org/ documentation/stubs/qiskit.providers.aer.StatevectorSimulator.html#qiskit. providers.aer.StatevectorSimulator. Accessed 15 Sept 2020 25. Gerdt, V.P., Kotkova, E.A., Vorob’ev, V.V.: The teleportation of the Bell states has been carried out on the five-qubit quantum IBM computer. Phys. Particles Nuclei Lett. 16(6), 975–984 (2019). https://doi.org/10.1134/S1547477119060153 26. Preskill, J.: Quantum computing in the NISQ era and beyond. Quantum 2, 79 (2018) 27. Harper, R., Flammia, S.T.: Fault-tolerant logical gates in the IBM quantum experience. Phys. Rev. Lett. 122, 080504 (2019) 28. Ball, H., Biercuk, M.J., Carvalho, A., et al.: Software tools for quantum control: Improving quantum computer performance through noise and error suppression. arXiv:2001.04060 (2020) 29. Superconducting qubits: improving the performance of single qubit gates, https://docs.q-ctrl.com/boulder-opal/application-notes/superconducting-qubitsimproving-the-performance-of-single-qubit-gates. Accessed 18 Sept 2020

Management of Risks for Complex Computer Network A. O. Kalashnikov(B)

and E. V. Anikina(B)

V.A. Trapeznikov Institute of Control Sciences Russian Academy of Sciences, Moscow, Russia [email protected], [email protected] https://www.ipu.ru/

Abstract. The paper is concerned with a general model of complex computer network, within which a risk manager exercises efficient management of risks of a complex system through distribution of available resource among its elements (units of computer networks). A tasks of risks management are considered in a context of uncertainty and mutual influence of system elements on each other and methods for solving them are proposed. Keywords: Computer network · Management of risk Arbitral solution · Cognitive game

1

· Risk manager ·

Introduction

The modern stage of Russia’s development may be described just in one word – digitalization, as the sphere and volumes of application of digital and information technologies are each day expanding and increasing. This fact is reflected among other in the programs for implementation of National Projects adopted in Russia in 2018–19, and not only those that, to some extent, directly relate to introduction of digital and information technologies in various areas of public and economic activity, for example, “Digital Economy”, “Science” or “Education”, but also those that involve a significant improvement in the quality of life and development of citizens: “Healthcare”, “Culture”, “Safe and High-Quality Roads”, “Housing and Urban Environment”, “Ecology” and some others. Within these projects a great number of large-scale, distributed systems are created, often having no analogues both in their complexity, on the one hand, and in size of potential threats that arise in the event of their failure or incorrect operation, on the other hand [1,2]. Examples of such systems are Internet segments, a set of objects that form a critical information infrastructure of Russia, distributed automated control systems for technological production, segments of the Internet of things and industrial Internet, distributed corporate information systems, telecommunications systems, fixed and mobile communication systems, and a number of others. c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 144–157, 2020. https://doi.org/10.1007/978-3-030-66242-4_12

Management of Risks for Complex Computer Network

145

Meanwhile, performed analysis shows that with few exceptions approaches to solution of risk management challenges and safety of complex systems are exercised exclusively based on traditional positions, when a set of independent, autonomous chains of a following type is considered as management mechanisms: standard risk – standard scenario – standard resources. This approach contemplates that events, when standard risks are brought about, occur independently of each other, and as far as probability estimation of the said events is minor, expectation of simultaneous or successive occurrence of such several events may be disregarded. It therefore follows from the foregoing assumption that as only one risk-generating event is exercised during some period of time, a single standard scenario may be implemented for its detecting, preventing and relieving the consequences and a set of standard resources may be applied as determined by such scenario. Under present-day conditions this approach can’t be unfortunately considered as satisfactory, whereas as evidenced by the analysis, during several dozens of years occurrence of one risk-generating events may directly or indirectly instigate occurrence of other risk-generating events, such events may in exchange bring about further risk-generating events and so forth. And we can’t exclude possibility of influence of further events on initial ones, both towards strengthening and weakening of any related risks. Thus, for current efficient resolution of risk management tasks and safety of complex systems it is necessary to use approaches allowing to consider riskgenerating events and related risks not from the “point” in some phase space but rather as a dynamic network, which units significantly affect the state of each other.

2

General Model

Let’s consider a complex system consisting a variety of elements: S = {s1 , . . . , si , . . . , sn }, i ∈ N = {1, . . . , n}. Let’s assume within the framework of a model si ∈ S, i ∈ N , are elements of the system S, that are not independent and can have a certain effect on each other’s state. Suppose there is a subject that we will call RM (risk manager). Let’s assume RM has a certain amount of resource X  0, that can be arbitrarily n allocated between elements of the system S : x = (x1 , . . . , xn ), xi  0, i ∈ N, i=1 xi  X. Let us denote the set of a admissible distributions of resource X between the elements of the system S by n RM : X(X) = {x = (x1 , . . . , xn ) ∈ Rn : xi  0, i ∈ N, i=1 xi  X}. Since elements of the system S are not independent and may have some effect on the state of each other within the model, local risk shall mean some local characteristic of a separate element si ∈ S, i ∈ N , depending not only on amount of resource xi  0, reserved by RM for this element, but also on distribution of resources for remaining elements of the system S, i.e. on the vector x = (x1 , . . . , xn ) ∈ Rn . Integral risk shall similarly mean some integral characteristic of the overall system S as a whole, also depending on the vector contingent on x = (x1 , . . . , xn ) ∈ Rn .

146

A. O. Kalashnikov and E. V. Anikina

Let’s define the function of local risk: ρi (x) : Rn → R1 for each element si ∈ S, i ∈ N of the system S and assume the vector-function of risk (ρ1 (x), . . . , ρn (x)) uniquely describes the state of the system S. Similarly, we define the function of integral risk: ρ(x) = ρ(ρ1 (x), . . . , ρn (x)) for the system S as a whole. In the simplest form the sum of local risks of all nelements of the system S can be chosen as the integral risk function: ρ(x) = i=1 ρi (x). Let us denote vector as: z = (z1 , . . . , zn ) ∈ Rn , then: z = (z1 , . . . , zn )  0, if zi  0, i ∈ N . Let us assume the functions of local risk ρi (·), i ∈ N , are continuous, differentiable everywhere, and have the following properties within the model: C1 (the nonnegativity of risk): for any i ∈ N, x  0 : ρi (x)  0; ∂ρi (x) C2 (the monotony of risk): for any i ∈ N, k ∈ N : < 0; ∂xk C3 (the limited of risk): for any i ∈ N, x  0: there is ρ∞ > 0 such that i . ρi (x) > ρ∞ i Property C1 means potential damage connected with implementation of the local risk for any element si ∈ S, i ∈ N of the system S which can’t be negative. Property C2 means for any element si ∈ S, i ∈ N of the system S that additional allocation of the resource by RM subject shall lead to reduction of local risk for all elements of the system S. Property C3 means that for any element si ∈ S, i ∈ N of the system S no additional allocation of the resource by RM subject is incapable to reduce local risk for this element “to zero”. In other words, notwithstanding the volumes of resources spent by RM subject for any element si ∈ S, i ∈ N of the system S a positive residual risk always subsists. Thus, the functions of local risk ρi (·), i ∈ N are a family of non-negative, bounded, and strictly monotonic functions that decrease in all arguments. The following tuple sets the model of risk management for a complex system: RM, X, S = {si }, {pi (·)}, p(·), i ∈ N 

(1)

We assume that within the General Model the target of RM subject is the following: to achieve maximum possible reduction in value of the integral risk ρ(x), using the available resource X and distributing it among elements of the system S. The RM’s goal can be formally written as: inf p(x) = inf p(p1 (x)), . . . , pn (x))

x∈X

x∈X

(2)

Handling of task (2) is a search for the global minimum of the function ρ(x) in a bounded domain x ∈ X and can be obtained by traditional numerical methods (see, for example, [3]) for known functions of local risk ρi (·), i ∈ N. Let us assume we do not know the specific type of functions local risk ρi (·), i ∈ N for any element si ∈ S, i ∈ N , of the system S, it is usually the case in practice (see , for example, [4]), but we know they satisfy the properties C1, C2, and C3. In this case, the methods for handling of task (2) become significantly more complex.

Management of Risks for Complex Computer Network

3

147

The Arbitral Solution

Let us consider the case when the elements si ∈ S, i ∈ N of the system S are independent and do not affect each other within the model presented in Sect. 2. An approach with an unknown specific type of functions of local risk to the handling of this task was first outlined, although in a slightly different formulation, in the article [5], and most fully described in the monographs [1,2]. This approach is based on the following considerations (for more details, see [1,2]). Since we do not know the specific form of the functions of local risk, let’s pass from the “global” task of minimizing the integral risk (2) to the “local” task of reducing the maximum of local risks ρi (·), i ∈ N : inf sup pi (x)

x∈X i∈N

(3)

Then the following tuple sets the model of information risk management for a complex system: RM, X, S = {si }, {pi (·)}, i ∈ N  The “good” resource distributions x (X) ∈ X(X) are a handling to task (3) such that: x (X) = arg inf sup pi (x) x∈X i∈N

 Let us denote a subset of “good” resource distributions as X(X) ⊆ X(X). The following statement “on equalization of local risks” (see [1,2]), in the notation of the model considered above, is true for the task (3). and C3 and there Statement 1. Let ρi (·), i ∈ N satisfy the properties C1, C2 n n ) ∈ X(X) such that: i = X and is a resource distribution ( x1 , . . . , x i=1 x x1 ) = . . . = ρn ( xn ) = c = const, then ( x1 , . . . , x n ) is the only handling of ρ1 ( task 3. The essence of this statement is that, if it is impossible to implement the “global” criterion of risks reduction, the proper strategy of RM subject will be striving to ensure aligning of local risks for all elements of the system S through corresponding allocation of resources. Before proceeding to further review of we should note that in the absence of knowledge about specific type of local risk functions for any element si ∈ S, i ∈ N of the system S it is reasonable to assume that all elements of the system S are similar to each other. Then in a certain sense the local risk functions themselves x1 ), . . . , ρn ( xn ). will be “similar”: ρ1 ( Suppose RM knows the current local risk values for each element si ∈ S, i ∈ N , of system S, before any resources are allocated to them. Let us denote the specified values ρi (0), i ∈ N and order them in descending order: ρ(1) (0)  . . .  ρ(n) (0). It follows that different amounts of resources will be spent, if RM’s goal is to equalize local risks, then to achieve this goal for different

148

A. O. Kalashnikov and E. V. Anikina

elements of si ∈ S, i ∈ N , of system S, and: if ρ(i) (0)  ρ(j) (0), then x(i)  x(j) must be performed. In this case, the values pi = ρi (0) can be considered as a kind of “requests” of the elements si ∈ S, i ∈ N , of the system S for the provision of a resource from RM. Let denote the vector of “requests” of the elements si ∈ S, i ∈ N , of the system S for the provision of a resource from RM as p = ( p1 , . . . , pn ). Suppose RM has a resource X, which is a function of the “requests” of elements of the system S, such that X = X( p1 , . . . , pn ) is symmetric, continuous, strictly monotonic, and X(0, . . . , 0) = 0. The indicated properties are quite natural and reflect the following features of the defender’s behavior: 1) not to allocate a resource without the need; 2) increase the amount of allocated resource in case of increasing risks; 3) consider all elements of the system S homogeneous in the absence of additional information. From the point of view of risk management, in [1,2] formulated and justified a number of “reasonable” requirements that must be satisfied with a “good” allocation of resources. n  i (X) = X. T1 (Pareto optimality): for any x (X) ∈ X(X) : i=1 x  T2 (monotone): for any X1 > X2  0 and x (X) ∈ X(X) : x (X1 ) > x (X2 ), j (X1 ) > xj (X2 ). that is x i (X1 )  xi (X2 ), i ∈ N and there is j ∈ N such that x  : if ρ(1) (0)  . . .  ρ(n) (0), then T3 (parity): for any x (X) ∈ X(X) (n) (X). x (1) (X)  . . .  x  The subset of “good” distributions of the resource X(X) ⊆ X(X) satisfying the requirements of T1, T2, and T3 is not empty, since, the uniform distribution  of the resource satisfies these requirements : e(X) ∈ X(X) : ei (X) = X/n it was shown in [1,2]. Given assumptions allow using for finding of efficient distribution of resource a game-theoretic approach on the basis of the arbitration scheme, based on the principles of stimulation and non-suppression (for further information refer to [6,7]). Let us briefly recall the main results, adhering to the terminology and designations defined in the General Model presented above. We will consider elements si ∈ S, i ∈ N of the system S as “players” of a game Γ( p), where p = ( p1 , . . . , pn ) is a vector of “requests” from elements of the system S for resource provision by RM, acting as a “arbiter”. Let us define X( p) = X( p1 , . . . , pn ) as an RM resource available for distribution and the set of admissible distributions of the resource X between elements of the system S: n p)}. X( p) = {(x1 , . . . , xn ) ∈ Rn : xi  0, i ∈ N, i=1 xi  X(  p) ⊆ X( Let’s denote X( p) — a subset of “good” resource distributions that satisfying the requirements of T1, T2, and T3. Definition 1. Let p(1)  . . .  p(n) , if:  p); 1) π ( p) ∈ X(

Management of Risks for Complex Computer Network

2) π (1) ( p) = π (2) ( p) = ...

sup

 p) x ( p)∈X(

sup

 (1) ( x ( p)∈X p)

p) = π (n−1) (

149

x (1) ( p);

x (2) ( p);

sup

 (1)(2)...(n−2) ( x ( p)∈X p)

x (n−1) ( p);

where   (1)(2)...(k) (  p) : x X p) = { x( p) ∈ X( (1) ( p) = π (1) ( p), . . . , x (k) ( p) = π (k) (p)} and k = 1, 2, . . . , n − 2, p), . . . , π (n) ( p)) – is the resource allocation by the “maxithen π ( p) = ( π(1) ( mum stimulating solution” (MS-solution). As a result, MS-solution will mean such distribution of resource X among elements of the system S when: firstly, specifications T1, T2 and T3 are met, and, secondly, the amount of resource as much as possible for number (1) among all such distributions is assigned for the element with number (1) with a maximum “request”; the amount of resource as much as possible for number (2) among distributions, where amount of resource for number (1) has already fixed and equal to π (1) (p) so forth, is assigned for the element with number (2) with second major “request”. The existence of an MS solution is not obvious as follows from the above definition. However, the following statement turns out to be true (see [1,2,5–7]): ( p) = ( π(1) ( p), . . . , Statement 2. Let p(1)  . . .  p(n) , then MS-solution π p)) exists and is unique. π (n) ( The aforesaid assumption enables within solution of task (3) to arrange efficient management of risks of a complex system, when maximum risk reduces first, then next by significance risk reduces, and so forth. Unfortunately, the proof of Statement 2 is not constructive and does not determine the MS-solution in an analytical form. Nevertheless, this can be done for a number of frequent cases, which allows applying the MS-solution in practice. Suppose the function X( p) has the form: X( p) = X( p1 + . . . + pn ), that is, depending only on the amount of “requests” all the elements si ∈ S, i ∈ N of ∂X( p1 + . . . + pn ) system S, which is quite common in practice, and > 0, for ∂ pi i ∈ N. The following statements [1, 2] turn out to be true for the cases when X( p) is convex, concave, or linear. Statement 3. Let p(1)  . . .  p(n) (we assume p1  . . .  pn for simplicity) p1 + . . . + pn ) ∂ 2 X(  0, for i ∈ N . Then the and X( p) is concave, that is: ∂ p2i MS-solution has the form: 1 pn ); μ+ p) = X(n n ( n n n 1 pk + i=k+1 pi ) − i=k+1 μ+ p) = (X(k p)), k = 1, 2, . . . , n − 1. μ+ n ( i ( k

150

A. O. Kalashnikov and E. V. Anikina

Statement 4. Let p(1)  . . .  p(n) (we assume p1  . . .  pn for simplicity) p1 + . . . + pn ) ∂ 2 X(  0, for i ∈ N . Then the MSand X( p) is convex, that is: ∂ p2i solution has the form: 1 μ− p1 ); p) = X(n n ( n k−1 k−1 1 (X( i=1 pi + (n − (k − 1)) p) = pk ) − i=1 μ− p)), k = μ− n ( i ( n − (k − 1) 2, . . . , n. Statement 5. Let p(1)  . . .  (we assume p1  . . .  pn for simplicity) and n p1 + . . . + pn ) ∂ 2 X( ≡ 0, for X( p) = α( i=1 pi ) + β(linear function), that is: ∂ p2i i ∈ N . Then the MS-solution has the form: p) = α pk = 1, . . . , n. μk ( Let us conclude from the analysis of the given MS-solution that reliable information about the values of “requests” of elements si ∈ S, i ∈ N , of the system S for the provision of a resource by player RM: p = ρi (0) is key for the implementation of this approach since: - firstly, it is an opportunity to order the elements si ∈ S, i ∈ N of the system S, taking into account their potential risk, which determines the priorities when allocating resources in accordance with the ordered vector of “requests” p(1)  . . .  p(n) ; - secondly, the ability to determine the corresponding amount of the resource X( p) = X( p1 , . . . , pn ), as a function of the indicated “requests”; - third, if RM chooses X( p) = X( p1 + . . . + pn ), as a function for calculating the resource volume , then it is possible to calculate the values of the MS-solution directly in accordance with statements 4–6. Thus, if we want to use some analogue of the MS-solution to handling task (3) within the framework of the model presented in Sect. 2, we need to develop a method that will allow us to evaluate the “requests” of the elements si ∈ S, i ∈ N , of the system S on the provision of a resource by RM: p = ρi (0), and their ranking p(1)  . . .  p(n) taking into account the mutual influence on each other. Please, consider a few examples. Let for any element si ∈ S, i ∈ N of the system S the local risk function is of the following form: ρi (x) = ri × pi (x) + ρ∞ i , x ∈ χ(X), where ri > 0 is maximum possible damage from destructive effect on the element si ∈ S, i ∈ N, ρ∞ i  0 is a residual risk, and pi (x) is the function meeting the following properties: C4: for any i ∈ N, x  0 : pi (x) ∈ [0, 1]; ∂ρi (x) C5: for any i ∈ N, k ∈ N, < 0; ∂xk In fact, we may assume that pi (x), i ∈ N is the probability of implementing a destructive effect on the element si ∈ S, i ∈ N , the system S. An example of such function is, for example, the function pi (x) = e−xi .

Management of Risks for Complex Computer Network

151

It is rather clear that for so defined functions of the local risk ρi (x), i ∈ N the properties C1–C3 are met. Let’s assume for simplicity: ∞ r1 = . . . = rn = r, ρ∞ 1 = . . . = ρn = 0, p1 (x) = . . . = pn (x) = p, 0 < p < 1. It is obvious that if the elements si ∈ S, i ∈ N of the system S are independent and autonomous, then “requests” are such that p1 = . . . = pn , and as MS-solution equal allocation of the resources should be chosen: ei (X) = X/n. Example 1. If the graph G(S,W) is a “chain”. Case A. Let’s assume that basing on the structure of the graph G(S,W) some destructive influence on the system S may be performed sequentially n times, and the “entry point” for the influence is the element s1 , and distribution of this influence under the system S may only be carried out along the “lines of interrelation” between the elements. Thus (see Fig. 1A) the element s1 is affected first, and then if successful, the element s2 and so on up to the element sn . Let’s denote Pk , k ∈ N as the probability of “successful destructive influence” on the element sk , as it is easy to see that Pk = p1 p2 . . . pk = pk . Therefore we have: P1 > P2 > . . . > Pn , and thus the following shall be met: p1 > p2 > . . . > pn , and p), . . . , π (n) ( p)) shall be such that π 1 ( p) > . . . > π n ( p). MS-solution π ( p) = ( π(1) (

Fig. 1. 1A. For example 1A.

Case B. It is obvious, that if the - “entry point” of destructive influence is the element sn , the situation will change strictly into the opposite: Pk = pn pn−1 . . . pn−(k−1) = pk , P1 < P2 < . . . < Pn , so the following shall be ( p) = ( π(1) ( p), . . . , π (n) ( p)) performed: p1 < p2 < . . . < pn , and MS-solution π p) < . . . < π n ( p) shall be such that π 1 ( Case C. If the “entry point” is the element sk , k ∈ N, 1 < k < n, then we have (see Fig. 1C): Pk = p, Pk−1 = Pk+1 = p2 and so on, where: Pk > Pk−1 = Pk+1 > . . . , pk > pk−1 = pk+1 > . . . and MS-solution shall be such p) > π k−1 ( p) = π k+1 ( p) > . . . (Fig. 2). that π k ( Finally, if “entry points” for destructive influences are all elements si ∈ S, i ∈ N of the system S, these influences are applied in parallel (i.e., simultaneously on all elements of the system S), we have:

152

A. O. Kalashnikov and E. V. Anikina

Fig. 2. 1C. For example 1C.

P1 = P2 = . . . = Pn = p, p1 = p2 = . . . = pn with equal allocation of resources as MS-solution to be chosen: ei (X) = X/n, which coincides with MS-solution in the case, when elements of the system S are independent and autonomous. Example 2. If the graph G(S,W) is a “ring”. If we assume that as in the Case A (Example 1), “entry point” is the element s1 and so on, destructive influence is sequentially applied l-times, l ∈ N . We will review two cases below. Case A. If l  n, then, as you can clearly note, situations for the elements si ∈ S, i ∈ N of the system S do not differ from those earlier reviewed in the Example 1 (Fig. 3).

Fig. 3. 2A. For example 2A.

Case B. In case of l > n. To be more definite let’s assume that l = n + 1, then for all sk ∈ S such that 2  k  n the following is met: Pk = p1 p2 . . . pk = pk and P2 > . . . > Pn . However, for the element s1 probability of successful destructive influence, in contrast to the Case A, if of the following form: P1 = p + pn+1 (1 − p) > p. In other words, more resources than in the Case A of this example, shall be allocated for the element s1 (Fig. 4).

Management of Risks for Complex Computer Network

153

Fig. 4. 2B. For example 2B.

Analysis of the examples discussed above shows that in the case, when elements of the system S may influence each other, an effective solution of the “defender’s task”: - Firstly, significantly depends on the structure and “weights” of relations between elements of the system S, set by the graph G(S,W), as well as knowledge about possible ways of having destructive influence on the system S; - Secondary, local risks of the elements of the system S, as a result of the said interaction, may both increase or decrease. - Thirdly: finding of an efficient solution for resource allocation, provided that the graph G(S,W) has a rather complex structure, cannot be obtained in analytical form.

4

Cognitive Game

Either expert or expert-formalized or finally a formalized approach may be obviously used to solve the task (3). Let’s discuss this issue in more detail. As part of the expert approach, all “responsibility” for recording of effects that arise as a result of mutual influence of risks associated with the elements of the system S on each other is fully assigned to experts, being specialists in the field of information risk assessment. For more information about methods used in implementing this approach, please, see, for example, [8–11]. Within the expert-formalized approach the experts use formalized procedures that allow assessing, among other, multi-factorial risks. An example of such approach is a mechanism of comprehensive assessment, which is based on the apparatus of sequential binary convolutions. More information about this approach can be found, for example, in [12, see detailed bibliography ibidem], and in relation to information risk assessment - in [13–16]. We now proceed to consideration of the formalized approach. Let us consider the model in more detail described in Sect. 2. Let us assume that there is a complex system consisting of elements:

154

A. O. Kalashnikov and E. V. Anikina

S = s1 , . . . , si , . . . , sn , i ∈ N , which have a certain impact on each other, and transfer the risks associated with them to each other. Let us describe this effect by a weighted oriented graph G(S,W), where S is the set of nodes that coincides with the set of elements of the system S , and W ⊆ S × S is the set of directed arcs wi j = (si , sj ) ∈ W, i ∈ N, j ∈ N , which reflect the connections between the elements of the system S.. Suppose that two functions are given: ρ : S → R1 and σ : W → R1 , on G(S,W) where ρi , i ∈ N is the “weight” of nodes (elements of the system S), and σij , i ∈ N, j ∈ N — “weight” of arcs  (mutual influences of elements of the system S on each other). The matrix = σij  of size n × n reflects the “intensity” of the influence of the i-th element on the j-th element of the system S. Let us assume the mutual influence is carried out at discrete moments of time and the initial state of the system corresponds to the zero moment of time and the values of the weights of the elements of the system S: ρi (t = 0) = pi . Let us describe the change in the values of the weights of the elements si ∈ S, i ∈ N , of the system S as a result of their mutual influence on each other by the following expressions: pi (t + 1) = pi (t) +

n k=1

σik (pi (t)) − pi (t − 1)), t = 0, 1, . . . , pi (t = 0) = pi (4)

System (4) uniquely describes the dynamics of changes in the values of the “weights” of elements of system S as a result of their mutual influence on each other in the case when there is no information about a specific type of local risk functions ρi (·), i ∈ N for any element si ∈ S, i ∈ N , system S, but it is known that they satisfy the properties C1, C2 and C3 (see the description of the corresponding model in Sect. 2). Let ρi (t) = ρi (t) − ρi (t − 1) is the “rate” of change in the values of the “weights” of the elements si ∈ S, i ∈ N , of the system S (in the terminology [17,18], “momentum”), then expressions (4) can be represented as follows: n σik Δpi (t), t = 0, 1, . . . , Δpi (t = o) = pi (5) pi (t + 1) = k=1

The description of the graph G(S,W) together with the dynamics of changes in the values of the “weights” of elements of the system S up to the time t defined by expressions (4) or (5) will be called (for more details, see, for example, [17–22] “cognitive map”(the term was first introduced in [19])). Let pi (t) = (ρi (0), ρi (1), . . . , ρi (t)) is the vector of values of the “weights” of the element si ∈ S, i ∈ N , of the system S up to the time t, P (t) = (ρ1 (t), ρ2 (t), . . . , ρn (t)) is the vector of values of the “weights” of elements of the system S at time t, P(t) = (P (0), P (1), . . . , P (t)) — is the matrix of the dynamics of changes in the values of the “weights” of the elements of the system S up to the time t (in the terminology [17,18] — “trajectories”), t = 0, 1, . . .. The most important feature of “cognitive maps” is the ability to take into account the indirect influence of elements of the S system on each other, when one of the elements affects the other, through several intermediate ones.

Management of Risks for Complex Computer Network

155

Let us denote a unit matrix of size n × n as En and consider, following [18] the expression: B t = En +



+

2

+... +

t

, t = 1, 2, . . .

(6)

The dynamics of changes in the values of the “weights” of elements of the system S up to the time t, following (4) and (6) can be described (taking into account the above notation) by the expression: P (t) = B t P (0) + (En − B t )P (−1), t = 1, 2, . . .

(7)

Then if we assume that ρi (t) ≡ 0f ort < 0 (for more information, see [18]), then expression (7) takes the form: P (t) = B t P (0), t = 1, 2, . . .

(8)

 If matrix is such that all its eigen values are contained inside unit circle in complex plane, performance of this requirement t is sufficient for provision of preat t → ∞ (for more information, cision of a sum of natural degrees of matrix  see [18]). Let us denote the value of sum (6) as B ∞ as t → ∞(B ∞ ≈ (En − )−1 , see [18]), then as t → ∞ expression (8) takes the form: P (∞) = B ∞ P (0)

(9)

where P (∞) = (ρ1 (∞), ρ2 (∞), . . . , ρn (∞)) are the “steady-state” values of the local risks of the element si ∈ S, i ∈ N , of the system S, which we will consider as “requests” in the model described in Sect. 2. By ordering them in descending order ρ(1) (∞)  ρ(2) (∞)  . . .  ρ(n) (∞) and applying the approach presented above, we can choose as an effective solution problem (3) the corresponding MS-solution.

5

Conclusion

The paper is concerned with a general model of complex computer network, within which a risk manager exercises efficient management of risks of a complex system through distribution of available resource among its elements (units of computer networks). Local risk functions, meeting some specified requirements, are applied for estimation of the state of system elements, and for estimation of a state of system as a whole – a function of integral risk. A task of risks management is considered in a context of uncertainty, when there is no information about certain type of functions of a local risk of system elements.

156

A. O. Kalashnikov and E. V. Anikina

It is shown that in case of independence (absence of mutual influence on each other) of system elements to find efficient distribution of resource a gametheoretic approach on the basis of an arbitration network under principles of stimulation and non-suppression (MS-solution) may be used. It is also demonstrated that if system elements may have certain influence on the state of each other, another game-theoretical approach may be applied with the use of a game on cognitive map (a cognitive game). As further directions of study it seems appropriate to consider a model of information confrontation within a complex computer network, where except for RM, playing as a “defender” of complex system, there is also a subject, fulfilling a role of “attacker”.

References 1. Kalashnikov, A.O.: Modeli i metodi organizacionnogo upravleniya informacionnimi riskami korporacii, p. 312. Egves, Moscow (2011). ISBN: 978-5-91450-078-5 2. Kalashnikov, A.O.: Organizacionnie mehanizmi upravleniya informacionnimi riskami korporacii, p. 175. PMSOFT (2008). ISBN: 978-5-9900281-9-7 3. Matthias, E.: Multicriteria Optimization, p. 382. Springer, Heidelberg (2010) 4. Kozlov, A.D., Noga, N.L.: Riski informacionnoi bezopasnosti korporativnih informacionnih system pri ispolzovanii oblachnih tehnologii. Upravlenie riskom 3, 31–46 (2019) 5. Kalashnikov, A.O.: Upravlenie informacionnimi riskami s ispolzovaniem arbitrajnih shem. Sistemi upravleniya i informacionnie tehnologii 4(16), 57–61 (2004) 6. Rotar, V.I.: O principe stimulyacii v arbitragnoy sheme. Ekonomika i matematicheskie metodi, t. XVII, i. 4, pp. 751–764 (1984) 7. Rotar, V.I., Kalashnikov, A.O.: O maksimalno stimuliruyshem reshenii zadachi raspredeleniya dohodov. Tezisi dokladov soobshenii Vsesouznogo simpoziuma “Sovremennie problem matematicheskoy ekonomiki”, pp. 48–49. Vilnys: IMK AN Litovskoy SSR (1984) 8. Petrenko, S.A., Simonov, S.V.: Upravlenie informacionnimi riskami. Ekonomicheski opravdannaya bezopasnost, p. 384. Kompaniya AiTi, DMK Press (2004). ISBN: 5-98453-001-5 (AiTi), ISBN: 5-94074-246-7 (DMK Press) 9. Astahov, A.M.: Iskusstvo upravleniya informacionnimi riskami, p. 312. DMK Press, Bremen (2010) 10. Damodaran, A.: Strategicheskiy risk-manadjement: principi i metodiki. Per.s angl. OOO “I.D. Viliams”, p. 496 (2017). ISBN 978-5-8459-1453-8 (rus.) 11. Markova, A.S., Barabanov, A.V., Dorofeev, A.V., Markov, A.S., Cirlov, V.L.: Sem bezopasnih informacionih tehnologii. In: Pod red, p. 224. DMK Press (2017). ISBN: 978-5-97060-494-6 12. Novikov, D.A.: Teoriya upravleniya organizacionnimi sistemami, 3-e izd, p. 604. Izdatelstvo fiziko-matematicheskoi literaturi (2012). ISBN/ISSN: 978-5-94052-222-5 13. Kalashikov, A.O.: Upravlenie informacionnimi riskami organizacionnih system: obshaya postanovka zadachi. Informaciya i bezopasnost, Tom 19. No 1(4), 36–45 (2016) 14. Kalashikov, A.O.: Upravlenie informacionnimi riskami organizacionnih system: mehanizmi kompleksnogo ocenivaniya. Informaciya i bezopasnost, Tom 19. No 3(4), 315–322 (2016)

Management of Risks for Complex Computer Network

157

15. Kalasnikov, A.O., Anikina, E.V.: Model upravleniya informacionnoi bezopasnostiyu kriticheskoi informacionnoi infrstructuri na osnove viyavleniya anomalnih sostoyanii (Chast 1). Informaciya I bezopasnost, Tom 21. No 2(4), 145–154 (2018) 16. Kalashnikov, A.O., Anikina, E.V.: Model upravleniya informacionnoi bezopasnostiyu kriticheskoi informacionnoi infrstructuri na osnove viyavleniya anomalnih sostoyanii (Chast 2). Informaciya I bezopasnost, Tom 21. No 2(4), 155–164 (2018) 17. Roberts, F.S.: Discretnie matematicheskie modeli s prilojeniyami k socialnim, biologicheskim i ekologicheskim zadacham. Nauka, p. 496 (1986) 18. Novikov, D.A.: “Kognitivnie igri”: lineinaya impulsnaya model. Problemi upravleniya 3, 14–22 (2008) 19. Tolman, E.: Cognitive maps in rats and men. Psychol. Rev. 55, 189–208 (1948) 20. Kulinich, A.A.: Sistematizaciya kognitivnih kart i metodov ih analiza. Tr. VII-i mejdunar. konf. “Kognitivnii analiz i upravlenie razvitiem situacii”, pp. 50–56. IPU RAN (2007) 21. Maksimov, V.I.: Structurno-celevoi analiz razvitiya socialno-ekonomicheskih situacii. Problemi upravleniya 3, 30–38 (2005) 22. Avdeeva, Z.K., Kovriga, S.V., Makarenko, D.I., Maksimov, V.I.: Kognitivnii podhod v upravlenii. Problemi upravleniya 3, 2–8 (2007)

Prerequisites and Methodology for Digital Transformation of 4G Networks into 5G Ecosystem V. L. Shirokov(B) Department of Network Integration (LLC “LANIT-Integration”), LANIT Inc. (LAboratory of New Information Technologies), Murmansk passage, 14-1, Moscow, Russia [email protected]

Abstract. The concept, architecture, operating modes, deployment and transformation scenarios, models, methods and stages of the evolutionary transition from 4G mobile networks to 5G ecosystems are considered. Existing 4G mobile networks are conditionally divided into the passive part, or the radio access network (RAN), and the active part or the communication system (CS). Moreover, the RAN is the mini heterogeneous part of the network, as well as the active part, is more complex, according to the functionality of the entire network. The models, methods of the modernization paradigm, as well as infrastructure and resources management of the existing 4G mobile network, ways and scenarios of evolutionary transformations into 5G are proposed. Keywords: Concept · Models · Methods · Mobile networks · RAN Clusters · Communication systems · Transformation scenarios · Accelerating · 5G ecosystems

1

·

Introduction

Existing mobile communication networks require continuous improvement, modernization, and scaling to meet the growing requirements of users [1]. The volume of traffic is growing on average by 26% per year. The requirements of users to the speed of network interaction and quality service are also increasing. Multimedia traffic components are growing. Video traffic already occupies 75% of total volume, and it forecasts to grow to 82% in 2022. In addition, the structure of mobile communications is complex, hybrid, and its capabilities are quickly exhausted. The network-oriented aggregate model used in the analysis of the parameters of existing 3G and 4G/LTE mobile networks and the network as a whole have the following limitations: – Basic communication systems CSs of the mobile network are focused on limited number of manufacturers, what increases as the capital cost (CAPEX) both operating cost (OPEX) of this network; c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 158–168, 2020. https://doi.org/10.1007/978-3-030-66242-4_13

Transformation of 4G Networks into 5G Ecosystem

159

– Radio access networks RANs are the least heterogeneous part of the mobile networks than CSs; – The communication networks CSs are more heterogeneous and determine the basic functionality of the mobile network, which laid down by equipment manufacturers. The above limitations of aggregate models are constraining factors in the improvement of 4G mobile communications and the transition to 5G. Overcoming limitations is possible through the evolutionary transformation of 4G networks into a 5G ecosystem. Note. A mobile network consists of radio access network (RAN), transport communication network, and core, or service systems in general. Hereinafter, mobile networks maybe named as the general term of RAN, unless otherwise not specified.

2

Statement of the Problem

The basic parameters of 5G ecosystem (compared to 3G and 4G mobile networks) are as follows: – – – –

time delay reducing to 1 ms; increasing 100-fold data transfer rate; guaranteed for five nines (99.999%) connection; service of up to 1 million devices and users per km2.

The best way to transition to 5G is to implement models of an open virtual infrastructure [2]: – from a monolithic network of one manufacturer to a flexible, disaggregated, multivendor; – from a closed, inefficient network to an open, modular IP-based and intelligent automation; – from a restricted CS and RAN systems to self-configurable, self-organizing, self-optimizing networks based on SON, software-defined operating modes via types and loading of services. Therefore, common concept, models, methods, and 4G network architecture scenarios will be need: – decomposition, i.e. division of a network into elements, modules, systems, clusters; – disaggregation, i.e. separation of aggregate network model into software and hardware; – migration to virtual open slicing infrastructure from aggregated model of network. Thus, transition willingness of 4G network to the 5G ecosystem is determined by digital transformation into a new infrastructure. Next, we consider the concept, models, methods, scenarios of accelerated evolutionary transition from existing mobile networks 4G/LTE to 5G ecosystem.

160

3

V. L. Shirokov

The Concept of 5G Ecosystem

The better way to 5G is software-defined systems and control decomposed mobile networks: – from monolithic, proprietary and single-vendor systems to flexible, disaggregated, multi-vendor systems; – from closed, inefficient, limited choices to open, modular, applying intelligent automation and e2e IP; – from network defined (and constrained) by RAN to network defined by the services and desired operational model So Cloud-RAN is an essential step to realize the potential of 5G networks. The readiness of existing 4G networks for transition to 5G ecosystem must go through evolutionary transformation into an open distributed communication cloud edge infrastructure [2–4], as well as show on Fig. 1. Integration of the O-RAN Alliance in the project of Telecommunication infrastructure project (TIP) is based on the principles of interaction and specifications of open radio access networks and radio communications (Open RAN, or O-RAN). TIP focuses on infrastructure modularity and interoperability via open source systems and plug-fests. And also the readiness into 5G transition is driving by distributed edge infrastructure.

Fig. 1. 5G ecosystem transformation

The main pathway to 5G is shown on Fig. 2. Where LTE is Long Term Evolution, NSA – Non-Stand Alone, SA – Stand Alone systems. The TIP project includes the following key provisions [2]: – multi-vendor construction; – modularity of the network structure, clusters, CS and RAN systems;

Transformation of 4G Networks into 5G Ecosystem

161

– dividing the network into software and hardware, thanks to the disaggregation method; – standard interfaces of RAN and CS modules, providing decomposition of network systems; – interoperability in the interaction of elements, modules, CS and RAN systems; – compatibility of systems providing open source software.

Fig. 2. The main pathway to 5G

RAN (Cloud O-RAN) offers the following features: – – – – –

a greater selection of equipment due to multi-vendor; accelerated market entry due to a greater variety of functionality; reduction in capital costs due to multi-vendor equipment selection; reduction of operating costs due to smart automation and control; due to cloud cover, great infrastructure flexibility, increasing network efficiency; – increased revenue through support for open API and rapid introduction of new services. 5G are software-defined open radio access networks, or SD O-RANs. In addition, an important step in creating an end-to-end network (from beginning to end) is the creation of a mobile C-RAN network for more efficient use of resources and the entire network. The basis of the approach to the new software architecture is that 5G is a common telecommunications distributed platform, which includes a virtual implementation, the following principles: – virtualization of radio access network, or vRAN; – peripheral data processing and distributed management, or Edge computing; – flexible access to user applications thanks to the user plane function (UPF), and MEC applications; – centralized processing, polices control, and operations services. In addition, the vBranch, or virtual branch layer, is specified here, which includes: – a common part of the infrastructure of the 5G distributed telecommunications platform; – end-to-end automatic resource dispatching, or orchestration.

162

V. L. Shirokov

The level of through orchestration is divided into several sublevels: – about mobility; • data transfer; • edge resources; – about centralized processing. In general, distributed 5G telecommunications platform includes the following hardware components: – – – – – – – – –

base stations; channels-fronthauls (these are new elements on 5G edges, or RANs); edge switches; edge processing nodes (new subsystems on 5G edges, or RANs); channels-middlehauls; core switches; channels-backhauls; core routers; core’s data centers.

Thus, a new structure, topology and entire architecture of 5G network is formed. So the features of subsystems and structures of traditional models of RANs, CSs and 5G network models are discussed below.

4

Subsystems and Structure of RAN and CS Models

Conventional CS and RAN systems are hybrid, aggregated models: – – – – –

were built, as rule, on equipment of one manufacturer; in terms of the functionality were not effective; by cost were not optimal; were poorly scalable; limited innovation.

In contrast, open O-RANs and cloud-based CSs are flexible NaaS “network as a service” models that have the following advantages: – – – – –

equipped with equipment from several vendor firms; ready for innovation and transformation to 5G; flexible in functionality; cost-effective; well scalable.

Transformation of 4G Networks into 5G Ecosystem

163

Thus, the structure of the new virtualized 5G network model includes the following logical systems: 1. software-defined radio access network (SD-RAN); 2. virtualized cloud systems and cloud (Cloud); 3. intelligent support systems (or intellectual, ISS) for automation, support of network operations (SON, BSS, HSS, OSS, IP, and transport). Thus all elements, modules and subsystems of the common 5G infrastructure are shown on Fig. 3.

Fig. 3. 5G infrastructure elements

v – virtual, EMS – Element Management System, AAS – Adaptive Antenna System, RRU – Remote Radio Unit, EPC – Evolving Packet Core Such a stratification of the network into a subsystem allows to build fully open 5G generation software-defined cloud virtual network. Now then: 1. Radio Access Network (RAN) is open virtualized SD-vRAN, which implies a slicing decomposition of vRAN into following modules and systems: – virtual element management system vEMS of virtual radio access network vRAN; – software (SoftWare, S/W) of the vRAN virtual radio access network, consisting of: • virtualized distributed units vDUs and • virtualized centralized control units vCUs; – part of the cloud infrastructure that is responsible for virtualizing network functions for the RAN;

164

V. L. Shirokov

– base stations, i.e. cell sites Cell Sites, consisting of: • remote radio units RRUs; • adaptive antenna systems AASs; – Open RAN (O-RAN), implying interoperability and compatibility for RAN devices and systems from different manufacturers; – project management office (PMO). 2. Cloud is an open part of the 5G O-RAN ecosystem, which includes the following modules and subsystems: – centralized automation system SON and dispatching resources, or orchestration SON & Orchestration; – centralized CNF and virtualized VNF network functions of the evolving vEPC packet core [6], 5GC system core, vIMS multimedia transmission system [5]; – cloud infrastructure virtualization of network functions in the form of: • virtual machines VMs and virtual containers VCs; – edge data centers (Border data centers) EDCs and cloud central data centers CDCs; – fully certified, i.e. compatible open radio access network O-RAN; – intelligent support systems (OSS, BSS, HSS); – low services System Services. 3. Support Systems of 5G network include the following main subsystems: – Self-configuration, self-organization, self-optimization system, named SON; – Support of subscriber profiles server, named home subscriber HSS; – Operations Support System, named OSS; – Business Support System, named BSS; – Support of Transport and IP protocols.

5

RAN Deployment Models

First model is shown on Fig. 4.

Fig. 4. RAN deployment model (First Model)

Transformation of 4G Networks into 5G Ecosystem

165

Where NFVI – Network Functions Virtualization Infrastructure, SW – SoftWare, HW – HardWare, EMS – Element Management System, IMS – IP Multimedia Subsystem, v – virtualized, DU – Distributed Unit, CU – Control Unit (of control plane), EPC – Evolved Packet Core (or vEPC of 5G Core), HSS – Home Subscriber System, OCS – Operating Control System, PCRF – Policy and Charging Rules Function. It is centrally distributed, which requires good optical transport and includes the following blocks: – NFV orchestrator (NFVO) of network functions virtualization, which manages resources and network services, as well as a number of other functions; – Service Controller (VNFM, or VNF Manager); – Operation Support System (OSS). This is a fully automated virtualized service delivery network (Zero Touch, without operator intervention, i.e. automatically, except in emergency cases). Provides a fully dynamic allocation of resources between 4G and 5G networks without any predefined levels (presets). It includes following vRAN modules and subsystems: – on the edge side NFVI HW, NFVI SW, local data center, vDU, vCU, vEMS; – on the central side – vEPC, vIMS, central data center, PCRF, HSS, OCS. Second model is shown on Fig. 5.

Fig. 5. RAN deployment model (Second Model)

166

V. L. Shirokov

Here LTE – Long Term Evolution, MH – Middle Haul It is a low-density cloud-based virtualized vRAN architecture mounted on a mast, which does not require optical transport, includes the following blocks: – vDU - virtualized DU, mounted on a mast in its own box; – centralized CU, Management & Automation, including: • OSS, VNFM and orchestrator; • vCU, vEMS; vEPC, vIMS, PCRF, HSS, OCS; • NFVI HW, NFVI SW and centralized data center CDC; – Transport network (MH, or Middle Haul) between vDU and CDC. Third model is shown on Fig. 6.

Fig. 6. RAN deployment model (Third Model)

It is a cloud, similar to the second model, virtualized vRAN architecture of high density, also mounted on a mast, which does not require optical transport. The difference is that the edge vDU consists of several DUs, which form a cluster, also mounted on the mast in one common box.

6

Stages of Transition to the Open O-RAN 5G Network

Three consecutive steps are proposed for moving from O-RAN to the 5G ecosystem: – Improving 4G/LTE by increasing the speed, quality of multimedia data transmission, introducing intelligent automation; – 5G NSA (Non-Stand Alone) - joint use of existing 4G/LTE base stations and new 5G with improved parameters of mobile communications in speed, capacity, reliability;

Transformation of 4G Networks into 5G Ecosystem

167

– 5G SA (Stand Alone) - the use of only 5G base stations providing real-time communications, mass telecommunications, ultra-reliable machine communications, IoT, etc. Along with orchestration, it is necessary to monitor, analyze and manage data transmission. So, for the use of machine learning and artificial intelligence methods in network analytics, a new paradigm about the location of subscribers, as well as the statistics of traffic of devices and users, is gaining interest. In the future, also the transition to a hybrid network architecture is the key to the development of artificial intelligence models. Therefore, the proposed concept, models and analysis methods for the parameters of existing 4G/LTE networks provide an accelerated transition to the 5G ecosystem.

7

Conclusion

I The features of traditional solutions used in 4G/LTE mobile communication networks, which hinder and limit the transition to 5G networks, are noted. II The concept of the 5G open cloud ecosystem, its advantages, evolutionary paths to the transition to the 5G network are reviewed and analyzed. III The elements, systems and architecture of the traditional and new RAN models, the main network support subsystems for the transition to the 5G ecosystem are considered. IV Deployment models and stages of a sequential evolutionary transition from 4G/LTE networks to an open 5G cloud network are proposed. Findings i The proposed concept, models and analysis methods for the parameters of existing 3G and 4G/LTE networks provide an accelerated evolutionary transition to the 5G ecosystem. ii The first step in the transition should be the introduction of 5G automation and improvement of 4G network performance parameters. iii The second step should be the joint use of 4G and 5G networks with the gradual shutdown of 4G base stations. iv The proposed methodology is a scenario for implementing the 5G concept using a flexible, open, software-controlled network that will provide a wider range of better services at lower cost. And finally Finland, China, South Korea and Japan have already begun to develop 6G technologies [7]. As the 5G active deployment phase is underway, Finland’s 6G program, for example, is not only 6G. But above all, projects, tests and demonstrations aimed at improving 5G technology. At the same time, work is underway on the main technological innovations and solutions that will be required in 6G. By 2030, it is expected that society will be driven by data and unlimited, virtually instantaneous, wireless mobile communications. But this is the topic of another material.

168

V. L. Shirokov

References 1. Cisco Annual Internet Report - Cisco Annual Internet Report (2018–2023) White Paper. https://www.cisco.com/c/en/us/solutions/collateral/executiveperspectives/annual-internet-report/white-paper-c11-741490.html. Accessed July 2020 2. Telecom Infra Project. (2020). https://telecominfraproject.com/. Accessed July 2020 3. 3GPP Technical specification 23.402: 3GPP System Architecture Evolution. www. 3gpp.org 4. The 5G concept does not suit Russian vendors: 5G networks will be built by foreigners. (2020). https://www.tadviser.ru. Accessed July 2020 5. Virtual Evolved Packet Core (vEPC) Solution from Affirmed. (2019). https://www. affirmednetworks.com/products-solutions/virtual-evolved-packet-core/. Accessed July 2020 6. Poikselka, M., Niemi, A., Khartabil, H., Mayer, G.: The IMS: IP Multimedia Concepts and Services. John Wiley & Sons, New Jersey (2006) 7. Tom´ as, J.: ‘6G to satisfy the expectations not met with 5G’: 6G Flagship Program (2020). https://www.rcrwireless.com/20200407/5g/6g-satisfy-expectationsnot-met-5g-6g-flagship-program. Accessed July 2020

Analytical Modeling of Distributed Systems

The Simulation of Finite-Source Retrial Queueing Systems with Two-Way Communications to the Orbit and Blocking ´ am T´oth(B) , Akos ´ J´ anos Sztrik, Ad´ Pint´er, and Zolt´ an B´ acs University of Debrecen, Debrecen 4032, Hungary {toth.adam,sztrik.janos}@inf.unideb.hu, [email protected], [email protected]

Abstract. A two-way communication, retrial queueing system is considered with a single server which from time to time is subject to random breakdowns. The investigated model is a M/M/1//N type of system where the number of sources is finite. After the service unit becomes idle it is able to call in customers residing in the orbit (outgoing call or secondary customers). Distribution of the service time of primary and secondary customers is exponential with rates μ1 and μ2 , respectively. Every used random variable is assumed to be totally independent of each other in the model. Each time the server becoming in faulty state the operation of the system is blocked resulting that throughout this period customers can not enter the system. The novelty of this analysis is to study the effect of blocking in such system on the main performance measures using different distributions of failure time. Results are illustrated graphically with the help of a simulation program developed by the authors. Keywords: Simulation · Blocking · Sensitivity analysis queueing system · Unreliable server · Retrial queue.

1

· Finite-source

Introduction

Because of the increasing number of users and devices mainly due to the rapid development of technology it is not an easy task to cope with the question of designing communication systems or redesigning an existing pattern or scheme. Nowadays, every company possesses some kind of network infrastructure so it is unavoidable that the exchange of information would not take place therefore developing mathematical and simulation models and algorithms play quite an The research was financed by the Higher Education Institutional Excellence Programme of the Ministry of Human Capacities in Hungary, within the framework of the NKFIH-1150-6/2019 thematic programme of the University of Debrecen. c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 171–182, 2020. https://doi.org/10.1007/978-3-030-66242-4_14

172

J. Sztrik et al.

important role to deal with traffic growth. Applying retrial queues in such scenarios are useful and powerful tools to describe real-life problems emerging from main telecommunication systems like telephone switching systems, call centers, computer networks, and computer systems. Many researchers are dedicated to investigating this topic, some examples are mentioned which study retrial queueing systems with repeated calls like in [4,5]. The applicability of these models is utilized in many areas of science like improving the efficiency of systems for example in the case of local-area networks with random access protocols and with multiple access protocols [1,10]. The characteristics of two-way communication have a beneficial effect on most of the systems consequently its popularity is quite well-founded in recent years. This can be explainable by the fact that the operation of certain reallife systems can be matchable with models based on a two-way communication scheme. In terms of call-centers, this is especially appropriate considering that the service unit (or agent) apart from handling incoming calls may carry out other activities including selling, promoting, and advertising products. In this paper whenever the server gets to idle state after some random time it is capable of calling customers residing in the orbit. In such scenes, the utilization of the service unit (or workload of agents) is crucial and extensively examined by many papers like [3,12]. Scrutinizing the available literature on the internet relatively quite a high number of papers are found where the service facilities are presumed to be available all the time. Reliable operation is quite optimistic and an unrealistic approach because deterioration, power supply failure, or unforeseen circumstances can happen anytime modifying moderately the system characteristics. Regarding wireless communication, several components affect the transmission rate resulting in interruptions that can arise at any time throughout transmitting the packets. It is always a key question of how the property of unreliable operation alters the performance measures and the characteristics of the system. Recently published works about retrial queuing systems with a non-reliable server can be found for example in [8,9,11]. The main aim of this work is to explore the mechanism of blocking of the investigated system and to compare various distributions of failure time on main performance measures like the mean waiting time of an arbitrary customer or the total utilization of the server. The present paper is a natural continuation of [16] and we want to compare the achieved results with each other. Our selfdeveloped simulation program is used to obtain every important performance measure using SimPack [6], which contains C/C++ libraries and executable programs for computer simulation. In this class, numerous algorithms can be found in connection with discrete-event, continuous, and combined (multi-model) simulation. Because of using other distributions apart from exponential and the fact that providing exact formulas is almost impossible we selected stochastic simulation to approximate the desired performance measures and to freely integrate any distribution in our code. The novelty of this paper is to present a sensitivity analysis of failure time on the main measures besides blocking using various

Finite-Source Retrial Queueing Systems with Two-Way Communications

173

distributions. Graphical illustrations are provided depicting an interesting phenomenon of sensitivity problems and comparison with the non-blocking system. This paper is the extended version of [17].

2

Model Description and Notations

Fig. 1. System model

In Fig. 1 the considered finite-source queueing system is shown by the help of two-way communication with retrials which contains a non-reliable server. We considered a finite-source queueing system with the help of two-way communication with retrials which contains a non-reliable server. The source contains N customers and each of them produces requests (primary or ingoing customers) with rate λ/N resulting exponentially distributed inter-arrival time with parameter λ/N . Our model does not comprise queues thus in case of an idle server the service of an incoming customer starts immediately. The distribution of the service time of these customers is exponentially distributed with parameter μ1 . After being successfully served the customers return to the source. Alternatively, arriving customers from the orbit or source finding the server in a busy state are forwarded instantly to the orbit. Waiting an exponentially distributed time with parameter γ/N in this virtual waiting room customers launches another attempt to occupy the service unit. From time to time failure of the server may arise according to gamma, hypo-exponentially, hyper-exponentially, Pareto, and lognormal distribution with different parameters but with the same mean value. During this period customers can not enter the system because they are rejected in that instant, this is the so-called blocking. The recovery process begins instantaneously upon the failure of the server, which is also an exponentially distributed random variable with parameter γ2 . If the service unit breaks down

174

J. Sztrik et al.

during the service of a customer then that customer is transferred to the orbit immediately. Whenever the server becomes idle it may perform an outgoing call (secondary customers) towards the customers located in the orbit after an exponentially distributed random time with rate ν. The service of these customers is executed according to an exponential distribution with a rate of μ2 . Rates λ/N and σ/N are used because in [14,15] very similar systems are evaluated by an asymptotic method where N tends to infinity and was proved that the number of customers in the system follows a normal distribution. All the random variables in the model creation are assumed to be totally independent of each other.

3

Simulation Results

Our self-written simulation program includes a statistic package that was developed by Andrea Francini in 1994 [7]. Basically, this statistical analysis tool is suitable to make a quantitative estimation of the mean and variance values of the desired variables using the method of batch means. In each batch, there are n observations and the useful run is divided into numerous batches. The batches should be long enough and approximately independent in order that the estimation would work correctly. This method belongs to one of the most popular confidence interval techniques for a steady-state mean of a process. In more detailed information about this method is included in the following works [2,13]. The simulations are performed with a confidence level of 99.9%. The relative half-width of the confidence interval required to stop the simulation run is 0.00001. 3.1

Squared Coefficient of Variation is Greater Than One

To realize the sensitivity analysis four different distributions of failure time are selected to compare the performance measures with each other. The parameters are chosen in such a way that the mean value and variance would be equal, so we applied a fitting process that is necessary to be done. [18] contains a detailed description of the whole process characterizing every used distribution. We differentiated two main scenarios from each other. In the first one, the squared coefficient of variation is greater than one so I utilized hyper-exponential, gamma, Pareto, and lognormal distributions. Table 2 quantifies all the used input parameters of the various distributions of failure time while Table 1 shows the values of other parameters. Table 1. Used numerical values of model parameters N

λ/N γ2 σ/N μ μ2 ν

100 0.01 1

0.01 1 1.2 0.02

Finite-Source Retrial Queueing Systems with Two-Way Communications

175

The steady-state distributions are represented on Fig. 2 when λ/N is = 0.01 comparing the effect of all four applied distributions of failure time. It shows the probability that exactly i customers are located in the system. Averagely the same number of customers resides in the system, slight differences can be perceivable especially in the case of Pareto. Taking a closer look at the graphs all the curves correspond to normal distribution despite the characteristics of the various distribution.

Fig. 2. Comparison of steady-state distributions when λ/N = 0.01

Table 2. Parameters of failure time Distribution

Gamma Hyper-exponential Pareto

Parameters

α = 0.6 p = 0.25 β = 0.5 λ1 = 0.41667 λ2 = 1.25

Mean

1.2

Variance

2.4

Squared coefficient of variation

1.6666666667

Lognormal

α = 2.2649 m = −0.3081 k = 0.67018 σ = 0.99037

In Fig. 3 the mean arbitrary response time is demonstrated as the request generation increases. Results clearly illustrate the effect of various distributions

176

J. Sztrik et al.

which is quite significant even though the first two moments are equal. The highest values are experienced at Pareto distribution while the lowest values at gamma distribution. The maximum property characteristic of a finite-source retrial queueing system arises which under suitable parameter setting occurs in spite of increasing arrival intensity.

Fig. 3. Mean waiting time vs. arrival intensity

Figure 4 shows how the total utilization of the server escalates applying intensifying arrival intensity. Under total utilization, we mean every single service including the service of primary, secondary customers, and the interrupted ones, too. By examining closely the figure the received values are almost identical but the tendency is counteractive as we have seen in Fig. 3. As more and more customers enter the system the total utilization of the service unit increases. Figure 5 emphasizes the effect of blocking on the mean waiting time versus arrival intensity. It is observable that in case of blocking the customers spend less time on average because during server failure the incoming customers go back to the source instead of waiting in the orbit. Besides the higher failure rate, the difference is more significant as well. At Fig. 5 the distribution of service time of the incoming customer is gamma, but the same tendency can be found in the case of the other distributions, too.

Finite-Source Retrial Queueing Systems with Two-Way Communications

177

Fig. 4. Total utilization of the server vs. arrival intensity

Fig. 5. The effect of blocking on the mean waiting time

3.2

Squared Coefficient of Variation Is Less Than One

Analyzing the results of the previous section we were curiously interested in how the modified parameters of the failure time alter the performance measures. In that case the parameters were chosen so that the squared coefficient of variation should be less than one. Instead of hyper-exponential we utilize hypo-exponential distribution because in the case of hypo-exponential distribution the squared coefficient of variation is always less than one. The same performance measures will be presented graphically as above but with using the new parameters of

178

J. Sztrik et al.

failure time which is shown in Table 3. The other parameters remain unchanged see Table 1. Table 3. Parameters of failure time Distribution

Gamma

Parameters

α = 1.3846 μ1 = 1 β = 1.1538 μ2 = 5

Hypo-exponential Pareto

Mean

1.2

Variance

1.04

Squared coefficient of variation

0.72222222

Lognormal

α = 2.5442 m = −0.08948 k = 0.7283 σ = 0.7373

Figure 6 presents the comparison of the steady-state distribution using different distributions of failure time. The curves overlap almost each other meaning that on average regardless the utilized distribution of failure time the same number of customers are located. As compared with Fig. 2 even the averages are identical, which is around 65–66. Despite the distinct distributions every graph is tend to be normally distributed as in the previous section.

Fig. 6. Comparison of steady-state distributions

In Fig. 7 it can be seen how the mean waiting of a customer develops along with increasing arrival intensity. By examining closer the received graphs it is

Finite-Source Retrial Queueing Systems with Two-Way Communications

179

observable that they are much closer to each other compared to Fig. 3 although they can be differentiated from each other moderately. As in the case of Fig. 3 the highest values are experienced at Pareto distribution. When the squared coefficient of variation is less than one in terms of every distribution the values of mean waiting is higher as in the previous section.

Fig. 7. Mean waiting time vs. arrival intensity using various distributions of operation time

Figure 8 demonstrates the utilization of the service unit in function of arrival intensity. No huge distinction can be discovered in terms of total utilization of the service unit among the various distributions observing the results. Basically we got back almost the same values except Pareto where the utilization is a little bit smaller. The same tendency can be noticeable comparing to Fig. 4 so at every distribution possess approximately same value of utilization. It is not surprising to see that the utilization increases with the increment of the arrival intensity. Figure 9 represents the effect of blocking on the mean waiting time in the function of arrival intensity. The analyzed system with blocking results in lower average waiting time of an arbitrary customer due to that a customer can not enter the system when the service unit is faulty. Regardless of the used input parameters of the operation time the difference is similar to what we have observed in Fig. 5. The distribution of the operation time follows gamma distribution but it has to be noted that the same tendency can be noticed in the case of the other distributions, too.

180

J. Sztrik et al.

Fig. 8. Total utilization of the server vs. arrival intensity using various distributions of operation time

Fig. 9. The effect of blocking on the mean waiting time

4

Conclusion

A finite-source retrial queueing system with the help of two-way communication is introduced with applying blocking and an unreliable server which can make outgoing calls towards the customers of the orbit. The effect of the used distributions and blocking is illustrated by several figures on the mean arbitrary waiting time and the total utilization of the server. With the aid of stochastic simula-

Finite-Source Retrial Queueing Systems with Two-Way Communications

181

tion, the obtained results clearly revealed that in case the squared coefficient of variation is greater than one the disparity among the values of displayed performance measures is significant having the same mean and variance. In the future we would like to complete this system with other features like experimenting with more distributions, introducing some kind of impatience of the customers, or including more capacity of service.

References 1. Artalejo, J., Corral, A.G.: Retrial Queueing Systems: A Computational Approach. Springer, Cham (2008) 2. Chen, E.J., Kelton, W.D.: A procedure for generating batch-means confidence intervals for simulation: Checking independence and normality. SIMULATION 83(10), 683–694 (2007) 3. Dragieva, V., Phung-Duc, T.: Two-way communication M/M/1//N retrial queue. In: Thomas, N., Forshaw, M. (eds.) ASMTA 2017. LNCS, vol. 10378, pp. 81–94. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-61428-1 6 4. Falin, G., Artalejo, J.: A finite source retrial queue. Eur. J. Oper. Res. 108, 409–424 (1998) 5. Fiems, D., Phung-Duc, T.: Light-traffic analysis of random access systems without collisions. Ann. Oper. Res. 277, 311–3277 (2019). https://doi.org/10.1007/s10479017-2636-7 6. Fishwick, P.A.: SimPack: Getting started with simulation programming in C and C++. In: In 1992 Winter Simulation Conference, pp. 154–162 (1992) 7. Francini, A., Neri, F.: A comparison of methodologies for the stationary analysis of data gathered in the simulation of telecommunication networks. In: Proceedings of MASCOTS 1996 - 4th International Workshop on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, pp. 116–122 (February 1996) 8. Gharbi, N., Dutheillet, C.: An algorithmic approach for analysis of finite-source retrial systems with unreliable servers. Comput. Math. Appl. 62(6), 2535–2546 (2011) 9. Gharbi, N., Nemmouchi, B., Mokdad, L., Ben-Othman, J.: The impact of breakdowns disciplines and repeated attempts on performances of small cell networks. J. Comput. Sci. 5(4), 633–644 (2014) 10. Kim, J., Kim, B.: A survey of retrial queueing systems. Ann. Oper. Res. 247(1), 3–36 (2015) 11. Krishnamoorthy, A., Pramod, P.K., Chakravarthy, S.R.: Queues with interruptions: a survey. TOP 22(1), 290–320 (2012) ´ B´erczes, T.: A contribution to modeling two-way 12. Kuki, A., Sztrik, J., T´ oth, A., communication with retrial queueing systems. In: Dudin, A., Nazarov, A., Moiseev, A. (eds.) ITMM/WRQ -2018. CCIS, vol. 912, pp. 236–247. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-97595-5 19 13. Law, A.M., Kelton, W.D.: Simulation Modeling and Analysis. McGraw-Hill Education, New York (1991) 14. Nazarov, A., Sztrik, J., Kvach, A.: A survey of recent results in finite-source retrial queues with collisions. In: Dudin, A., Nazarov, A., Moiseev, A. (eds.) ITMM/WRQ -2018. CCIS, vol. 912, pp. 1–15. Springer, Cham (2018). https://doi.org/10.1007/ 978-3-319-97595-5 1

182

J. Sztrik et al.

15. Nazarov, A., Sztrik, J., Kvach, A., B´erczes, T.: Asymptotic analysis of finite-source M/M/1 retrial queueing system with collisions and server subject to breakdowns and repairs. Ann. Oper. Res. 277(2), 213–229 (2018) ´ Pint´er, A., ´ B´ 16. Sztrik, J., T´ oth, A., acs, Z.: Simulation of finite-source retrial queues with two-way communications to the orbit. In: Dudin, A., Nazarov, A., Moiseev, A. (eds.) ITMM 2019. CCIS, vol. 1109, pp. 270–284. Springer, Cham (2019). https:// doi.org/10.1007/978-3-030-33388-1 22 ´ Pint´er, A., ´ B´ 17. Sztrik, J., T´ oth, A., acs, Z.: Reliability analysis of finite-source retrial queueing systems with two-way communications to the orbit and blocking using simulation. In: Proceedings of International Conference on Distributed Computer and Communication Networks, DCCN 2020 (2020) 18. Toth, A., Sztrik, J., Kuki, A., Berczes, T., Efrosinin, D.: Reliability analysis of finite-source retrial queues with outgoing calls using simulation. In: 2019 International Conference on Information and Digital Technologies (IDT), pp. 504–511 (June 2019)

Token Based Parallel Processing Retrial Queueing System with a Probabilistic Joining Strategy for Priority Customers Dhanya Babu(B) , V. C. Joshua, and A. Krishnamoorthy Department of Mathematics, CMS College Kottayam, Kerala, India {dhanyababu,vcjoshua,krishnamoorthy}@cmscollege.ac.in

Abstract. We consider a single server retrial queueing system with parallel queues of ordinary and priority customers. Priority customers join the queues according to a probabilistic joining strategy until the ordinary queue is full. We also assume that there is a waiting room for the blocked ordinary customers and they make retrials from there, to enter into the ordinary queue. Priority customers on arrival, seeing both ordinary and priority queue as full loss the system forever. Customers receive service on the basis of a token system. Ordinary customers, upon arrival finding the ordinary queue as full, enter into the orbit. Ordinary customers make their retrials from the orbit in an exponential duration of time intervals to enter into the ordinary queue. Ordinary customer from the orbit make their retrials in an exponential duration of time intervals. Whenever the queue size of ordinary queue is less than N then the ordinary customer in the orbit successfully enter into the ordinary queue. Two types of customers arrive according to Marked Markovian Arrival Process (MMAP). Service times are assumed to follow phase type distributions. Steady-state analysis of the model is done. Some system characteristics are evaluated. Keywords: Retrial queues Arrival Process

1

· Joining strategy · Marked Markovian

Introduction

The bibliographical information about retrial queues are given in [1,2]. Kulkarni analyzed a retrial queues with two types of calls for different retrial and service times in [11]. Falin extended the results to more than two types of calls in [6]. An M/M/1 queue with retrials and two streams of customers was studied in [16]. Choi gave a detailed survey of single server retrial queues with two types of calls for different variants such as different service times, geometric loss, feedback, vacations, recurrent calls, retrial rate control policy, threshold in retrial group and discrete time retrial queueing system in [4]. Multiple queues with simultaneous services are analysed in [3]. MMAP model is described in [5,13]. Steady-state probabilities are computed using Matrix Geometric methods c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 183–194, 2020. https://doi.org/10.1007/978-3-030-66242-4_15

184

D. Babu et al.

in [14]. The rate matrix is computed using Ramaswami’s Logarithmic Reduction Algorithm by [12]. In [7], Deepak T.G. et al. considered queues with postponed work. Analysis of various priority queues are described in [15]. The present work is an extension of [10] a single server queueing model with two independent Poisson arrival processes and phase type service distribution and an optimum joining strategy. This paper discusses the retrial version of the parallel queues of ordinary and priority customers where priority customers join the queues according to a probabilistic joining strategy. We consider the case when both ordinary queue and priority queue are of finite size. Priority customers join the queues according to a probabilistic joining strategy till the ordinary queue is full. We also assume that there is a waiting room for the blocked ordinary customers and they make retrials from there, to enter into the ordinary queue. Priority customers on arrival, seeing both ordinary and priority queue as full loss the system forever.

2

Model Description

We consider a single server parallel processing retrial queueing system with probabilistic joining strategy for priority customers. Here we assume that both ordinary and priority queues are of finite size. Ordinary customers (OC) form a queue say PC queue of size N and priority customers (PC) form a queue say OC queue of size M. Customers receive service on the basis of the token system. A token is circulating from 1, 2, . . ., K − 1, K if any of the queues are nonempty and whenever both the queues are empty, token number turns to 0. Even if the priority customer have the opportunity to get into service immediately as an ordinary customer than to stand in priority queue by joining strategy, we assume that some of priority customers take probabilistic decision whether to give up their additional benefit (reward) or not with a probability. Let p, 0 ≤ p ≤ 1 be that probability of joining in PC queue by a priority customer even if according to a joining strategy he should join in ordinary queue and with probability 1 − p he join in OC queue. This joining strategy occurs until ordinary queue attains a capacity of N − 1. Ordinary customers, upon arrival finding the ordinary queue as full, enter into the orbit. Ordinary customers make their retrials from the orbit in an exponential duration of time intervals to enter into the OC queue. Ordinary customer from the orbit make their retrials in an exponential duration of time intervals with parameter μ. Whenever the queue size of ordinary queue is less than N then the ordinary customer in the orbit successfully enter into the OC queue. The arrival process is governed by a continuous time Markov chain {J2 (t), t ≥ 0} with state space {1, 2, . . . n}. The sojourn time in the state i1 is exponentially distributed with a positive λ1i , when the sojourn time in the state i1 expires, the process jumps to the state j 1 without generation of a customer with a probability λ1i pi1 j 1 (0) = di1 j 1 (0) where i1 , j 1 ={1, 2, . . . n}. The process J2 (t) jumps from state i1 to j 1 with the generation of ordinary or priority customer with the probability di1 j 1 (1) and di1 j 1 (2) respectively λ1i pi1 j 1 (1) = di1 j 1 (1) and λ1i pi1 j 1 (2) = di1 j 1 (2).

Token Based Parallel Processing Retrial Queueing System

185

Let D0 = (di1 j 1 (0)), D1 = (di1 j 1 (1)) and D2 = (di1 j 1 (2)). The matrix D = D0 + D1 + D2 represents the generator of the process {J(t), t ≥ 0}. The average total arrival intensity λ is defined by λ = θ(D1 + D2 )e, where θ is an invariant vector of the stationary distribution of the Markov chain {A(t), t ≥ 0}. The vector θ is the unique solution to the system θD = 0 and θe = 1 where e is a column vector consisting of ones and 0 is a zero row vector. The average arrival intensities of ordinary and priority customers are given by λ(1) = θD1 e and λ(2) = θD2 e . The two types of customer’s arrive according to a Marked Markovian Arrival Process (MMAP) with representation (D0 , D1 , D2 ) with order n. Service time of an ordinary customer follows phase type distribution with representation P H(α, T ) of order s1 and that of priority customer follows phase type distribution with representation P H(β, S) of order s2 .

3

Mathematical Formulation of the Model

Let – – – – – –

N1 (t) be the number of customers at time t in orbit N2 (t) be the number of customers at time t in ordinary queue N3 (t) be the number of customers at time t in priority queue R(t) be the token numbers from 1, 2, . . ., K − 1, K J1 (t) be the phase of the service process J2 (t) be the phase of the arrival process

The customer in service is counted either in first queue or in second queue depending on the status of the token. Let {(N1 (t), N2 (t), N3 (t), R(t), J1 (t), J2 (t)); t ≥ 0} be the Markov Process on the state space Ω = l∗ ∪ (∪∞ i=1 l(i)) where l∗ = {(0, 0, 0, 0, 0, u) : 1 ≤ u ≤ m} and for i ≥ 1 , l(i) = {(i, j, k, r, u, v), i ≥ 1, 0 ≤ j ≤ M, 1 ≤ k ≤ N, 1 ≤ r ≤ K, 1 ≤ u ≤ m, 1 ≤ v ≤ n} where m = δ[r:1 S2 or S1 ≤ S2 with a OC customer in service; if a PC is in service is at his arrival epoch then he should join PC or OC according as S1∗ > S2 or S1∗ ≤ S2 . Even though the priority customer get service immediately by joining in ordinary queue by this joining strategy, we assume that some of the priority customers join in priority queue with a probability p where 0 ≤ p ≤ 1 by assuming some additional benefits.

4

Steady-State Analysis

The infinitesimal generator of the Markov chain is ⎞ ⎛ B A0

⎜ A2 ⎜ ⎜ ⎜ ⎜ Q=⎜ ⎜ ⎜ ⎜ ⎜ ⎝

A1 A0 A2 A1 A0 A2 A1 A0 ... ... ... ... ... ...

⎟ ⎟ ⎟ ⎟ ⎟ ⎟ ⎟ ⎟ ⎟ ⎟ ⎠

This model is a Level Independent Quasi-Birth-Death Process (LIQBD). We use matrix analytic method for the analysis of the system. The transition matrices corresponding to the transitions (see Table 1) in the boundary level matrices are given as follows. The corresponding macro states are of the form (i, j, k, r) where i denotes the number of customers in the orbit j, k denotes the number of customers in the ordinary and priority queues respectively and r denotes the current status of the token. The matrices A0 , A1 and A2 are as follows: ⎛ ⎞ ⎜ ... ⎜ A0 = ⎜ .. ⎝ .

⎟ ⎟ ⎟ ⎠ U



I(M +1)Ks1 ⊗ D1

⎜ U =⎜ ⎝

⎞ ⎟ ⎟ ⎠

I(M +1)Ks1 ⊗ D1 .. . I(M +1)Ks2 ⊗ D1

Token Based Parallel Processing Retrial Queueing System

187

Table 1. Intensities of transitions. From

To

Condition

(0, 0, 0)

(0, 0, 0, r)

for r = {1, 2, . . . , K − 1}

α ⊗ D1

for r = K

β ⊗ D2

(0, 0)

(0, 0)

(0, 0, 0, r)

(0, 0)

(0, 0, 0, K)

(0, 0)

(0, j, k, r)

(0, j, k, r)

Transition rate

D0 if r = {1, 2, . . . , K − 1}

T0 ⊗ In S0 ⊗ In

for r = {1, 2, . . . , K − 1}

T ⊕ D0

for r = K

S ⊕ D0

1≤j≤M

(0, 0, k, r)

(0, 0, k − 1, r + 1) for r = {1, 2, . . . , K − 2}

(T0 ⊗ β) ⊗ In

i ≥ 0, 1 ≤ j ≤ N ,1 ≤ k ≤ M

(0, 0, k, K − 1) (0, j, 0, r)

(0, 0, k − 1, K)

i ≥ 0, 1 ≤ j ≤ N, 1 ≤ j ≤ M

(S0 ⊗ β) ⊗ In

(0, j − 1, 0, r + 1)

for r = {1, 2, . . . , K − 2},1 ≤ j ≤ N,

(T0 ⊗ α) ⊗ In

(0, j, 0, K − 1) (0, j, 0, K) (i, 0, 0, 0) (i, j, k, r)

(0, j − 1, 0, 1)

i ≥ 0, 1 ≤ j ≤ N, 1 ≤ k ≤ M

(T0 ⊗ β) ⊗ In

(0, j − 1, 0, 1)

i ≥ 0, 1 ≤ j ≤ N, 1 ≤ k ≤ M

(S0 ⊗ β) ⊗ In

(i − 1, 0, 0, 1)

i≥0

μα

(i − 1, j + 1, k, r)

i ≥ 0, 0 ≤ j ≤ N − 1, 1 ≤ k ≤ M − 1,r = {1, 2, . . . , K}

μ

(i, 0, 0, r) (i, j, k, r)

(i − 1, 0, 0, r + 1)

i ≥ 0, r ≤ K − 2

T0 ⊗ μα

(i, j, k + 1, r)

if S1 ≤ S2 and r = {1, 2, . . . , K − 1}

pD2 ⊗ Is1

if S1∗ > S2 and r = K

D2 ⊗ Is2

i ≥ 0, 0 ≤ j ≤ N − 1, 1≤k ≤M −1

(i, j, k, r)

(i, j + 1, k, r)

if S1 ≤ S2 and r = {1, 2, . . . , K − 1}

(D1 + (1 − p)D2 ) ⊗ Is1

if S1 > S2 and r = {1, 2, . . . , K − 1}

D1 ⊗ Is1

if S1∗ > S2 and r = K

D1 ⊗ Is2

for i ≥ 0, 0 ≤ j ≤ N − 1, 1 ≤ k ≤ M −1

(i, j, M, r)

(i, j + 1, M, r)

(i, j, k, r)

(i, j − 1, k, r + 1)

(i, j, k, K)

(i, j − 1, k, 1)

r = {1, 2, . . . , K − 1}, i ≥ 0 , 0≤j ≤N −1

(D1 + D2 ) ⊗ Is1

for r = K, i ≥ 0

(D1 + D2 ) ⊗ Is2

if r = {1, 2, . . . , K − 2}

(T0 ⊗ α) ⊗ In

i ≥ 0, 1 ≤ j ≤ M

(S0 ⊗ α) ⊗ In

⎛ ⎜ ⎜ ⎜ A2 = ⎜ ⎜ ⎝

V1 V0

⎞ V0

⎟ ⎟ ⎟ ⎟ ⎟ V1 V0 ⎠ V0

188

where

D. Babu et al.





⎟ ⎟ ⎟ ⎟ ⎠

⎜I(M +1)K ⊗ μIs1 n ⎜ I(M +1)K ⊗ μIs1 n V0 = ⎜ ⎜ .. ⎝ . I(M +1)K ⊗ μIs2 n



V∗ ⎜. . . V1 = ⎝ ... ...



... ⎜. . .

μα ⊗ In

⎜ ⎜ ∗ ... V =⎜ ⎜ ⎜. . . ⎝. . . T 0 ⊗ μα ⊗ In

... ... ... ...

... ... ... ...



... ... ⎟ ... ⎠ ...

T 0 ⊗ μα ⊗ In .. .

⎞ ⎟ ⎟ ⎟ ⎟ ⎟ T 0 ⊗ μα ⊗ In ⎟ ⎠

. . . S 0 ⊗ μα ⊗ In

⎛A ⎜ ⎜ ⎜ A1 = ⎜ ⎜ ⎜ ⎝

10 A∗2



A00 A11 A01 ⎟ ⎟ A∗2 A12 A02 ⎟ ⎟ ... ... ... ⎟ ⎟ ... ... ... ⎠ ∗ A2 A1N −1 A0N −1 ∗ A2 A1N





where

A10

E10 E00 ⎟ ⎜ E2 E1 E0 ⎟ ⎜ E2 E1 E0 ⎟ ⎜ =⎜ ⎟ ... ... ... ⎟ ⎜ ⎠ ⎝ ... ... ... E2 E1



D0 α ⊗ D1 ⎜T ⊗ In T ⊕ (D0 − μIn ) ⎜ . .. ⎜ . . ⎜ .

β ⊗ D2

0

E10 = ⎜ ⎜ ⎜ ⎝T 0 ⊗ I

..

n

T 0 ⊗ In

. T ⊕ (D0 − μIn )

S ⊕ (D0 − μIn )

⎞ ⎟ ⎟ ⎟ ⎟ ⎟ ⎟ ⎟ ⎠

Token Based Parallel Processing Retrial Queueing System

⎛ E00

⎜ ⎜ =⎜ ⎜ ⎝



Im ⊗ D2

⎟ ⎟ ⎟ ⎟ ⎠

Im ⊗ pD2 ..

. Im ⊗ D2

Im ⊗ pD2





Im ⊗ pD2

⎜ ⎜ E0 = ⎜ ⎜ ⎝

..

. Im ⊗ pD2

. . . . . . . . . . . . T 0 ⊗ β ⊗ In ⎜. . . . . . . . . . . . T 0 ⊗ β ⊗ I n ⎜ .. ⎜ ... ... ... ... . E2 = ⎜ ⎜ ... ⎜. . . . . . . . . . . . ⎝. . . . . . . . . . . . T 0 ⊗ β ⊗ I n . . . . . . . . . . . . S 0 ⊗ β ⊗ In

⎜ ⎜ E1 = ⎜ ⎜ ⎝

T ⊕ (D0 − μIn )

⎜ ⎜ E11 = ⎜ ⎜ ⎝

⎞ ⎟ ⎟ ⎟ ⎟ ⎟ ⎟ ⎠

..

. T ⊕ (D0 − μIn )

S ⊕ (D0 − μIn )





T ⊕ (D0 − μIn )

⎟ ⎟ ⎟ ⎟ ⎠

T ⊕ (D0 − μIn )

A1i



Im ⊗ pD2



for 1 ≤ i ≤ N − 1

where

⎟ ⎟ ⎟ ⎟ ⎠

Im ⊗ pD2





189

E11 E01 ⎟ ⎜E21 E11 E01 ⎟ ⎜ ⎟ ⎜ E21 E11 E01 =⎜ ⎟ ... ... ... ⎟ ⎜ ⎠ ⎝ ... ... ... 1 1 E2 E1

⎞ ⎟ ⎟ ⎟ ⎟ ⎠

T ⊕ (D0 − μIn ) ..

. T ⊕ (D0 − μIn )

S ⊕ (D0 − μIn )

190

D. Babu et al.

The transitions of E01 depends on the strategy. ⎛ .. . ⎜ ⎜ .. ⎜ . ⎜ ⎜ .. ⎜ . ⎜ 1 E2 = ⎜ .. ⎜ . ⎜ ⎜ .. ⎜ . ⎜ ⎝T 0 ⊗ β ⊗ I n ...



. . . . . . . . .⎟



. . . . . . . . .⎟ ⎟



. . . . . . . . .⎟ ⎟



. . . . . . . . .⎟ ⎟



. . . . . . . . .⎟ ⎟ . . . . . . . . .⎠ ... ... ...





A1N ⎛ ⎜ ⎜ E011 = ⎜ ⎜ ⎝

E11 E011 ⎟ ⎜E21 E11 E011 ⎟ ⎜ E21 E11 E011 ⎟ ⎜ =⎜ ⎟ ... ... ... ⎟ ⎜ ⎠ ⎝ ... ... ... 1 1 E2 E1

Im ⊗ D2

. Im ⊗ D2





F

⎜ F1 ⎜ ∗ .. A2 = ⎜ . ⎜ ⎝ F1 where



⎟ ⎟ ⎟ ⎟ ⎠

Im ⊗ D2 ..

Im ⊗ D2

⎟ ⎟ ⎟ ⎟ ⎠ F1



T0 ⊗ α ⊗ In

⎜ .. ⎜ . ⎜ ⎜ T0 ⊗ α ⊗ In F =⎜ T0 ⊗ α ⊗ In ⎜ ⎝T0 ⊗ α ⊗ In S0 ⊗ α ⊗ I n



⎜ ⎜ F1 = ⎜ ⎜ ⎝



T0 ⊗ α ⊗ In ..

. T0 ⊗ α ⊗ In

S0 ⊗ α ⊗ I n



⎟ ⎟ ⎟ ⎟ ⎠

⎟ ⎟ ⎟ ⎟ ⎟ ⎟ ⎠

Token Based Parallel Processing Retrial Queueing System

191

The transitions of A0i for 0 ≤ i ≤ N − 1 depends on the strategy. The matrix A = A0 + A1 + A2 can be written as ⎞ ⎛C10 C00 C21 C11 C01 C22 C12 C02 ... ... ...

⎜ A=⎝

4.1

... ...

...

⎟ ⎠

C2(N −1) C1(N −1) C0(N −1) C2N C1N

Stability Condition

Let π be the steady-state probability vector of A such that πA = 0 and πe = 1 πi = πM

M −1−i

HM −1−j

(1)

j=0

for i = 0, 1, . . . M − 1. The sequence of matrices Hi are defined as Hi = −C2i [Hi−1 C0i + C1i ]−1 for i = 1, 2, . . . , N − 1 and H0 = −C20 [C10 ]−1 . The vector πM is obtained from the equation πe = 1 where ⎡ ⎤ N −1 N −1−i πN ⎣ HN −1−j + I ⎦ e = 1 i=0

(2)

j=0

The stability condition is given by πA0 e < πA2 e where πA0 e = πN [I(M +1)(K+1) ⊗ D1 ]e πA2 e = [π0 + π1 + π2 + . . . πN −1 ] V1 e + [π0 + π1 + π2 + . . . πN −2 ] I(M +1)(K+1) ⊗ μImn e

4.2

Steady-State Probability Vector

The stationary distribution of the Markov process under consideration is obtained by solving the set of equations xQ = 0, xe = 1. Let x be the steadystate probability vector of Q. Partition this vector as: x = (x0 , x1 , x2 , . . . ), where xi = (xi0 , xi1 , . . . xiN ) xij = (xij0 , xij1 , xij2 , xij3 , . . . xijM ) for j = 0, 1, 2, . . . , N whereas for k = 0, 1, 2 . . . M, the vectors xijk = (xijk1 , xijk2 , . . . , xijkK ), where xijkr is the probability of being in state (i, j, k, r) for r = 1, 2, . . . K, i ≥ 0, j = 0, 1, 2 . . . N, k =

192

D. Babu et al.

0, 1, 2 . . . M . For r = 1, 2 . . . K, the vectors xijkr = (xijkr1 , xijkr2 , . . . , xijkrm ), where xijkru is the probability of being in state (i, j, k, r, u) for r = 1, 2, . . . K, i ≥ 0, j = 0, 1, 2 . . . N, k = 0, 1, 2 . . . M, u = 1, 2, . . . m. For u = 1, 2, . . . , m, the vectors xijkru = (xijkru1 , xijkru2 , . . . , xijkrun ), where xijkruv is the probability of being in state (i, j, k, r, u, v) for r = 1, 2, . . . K, i ≥ 0, j = 0, 1, 2 . . . N, k = 0, 1, 2 . . . M, u = 1, 2, . . . m, v = 1, 2, . . . n and xi0 is the probability of being in state (i, 0, r, u, v). Under the stability condition the steady-state probability vector is obtained as xi = xi−1 R, i ≥ 1 xi = x 0 R i , i ≥ 1 where the matrix R is the minimal non negative solution to the matrix quadratic equation R2 A2 + RA1 + A0 = 0 (3) and R can be obtained by successive substitution procedure R0 = 0 and Rk+1 = −1 −V −Rk2 W where V = A2 A−1 1 , W = A0 A1 by Logarithmic Reduction Algorithm developed by Latouche and Ramaswamy in [12]. The vectors x0 and x1 are obtained by solving x0 B + x1 A2 = 0 xi−1 A0 + xi A1 + xi+1 A2 = 0, i ≥ 1 subject to the normalizing condition x0 (I − R)−1 e = 1. 4.3

Performance Measures

1. Expected Number of customers in the orbit E[NO ] =



ixi e

i=0

2. Expected Number of ordinary customers in the system E[N1 ] =

∞ N

jxi e

i=0 j=0

3. Expected Number of priority customers in the system E[N2 ] =

∞ N M i=0 j=0 k=0

kxijk e

(4)

Token Based Parallel Processing Retrial Queueing System

193

4. Expected Number of customers in the system E[N ] = E[NO ] + E[N1 ] + E[N2 ] 5. Probability that the server is idle t0 =



xi00

i=0

6. Probability that the server is busy with an ordinary customer ∞ N M K−1

t1 =

xijkr e

i=0 j=0 k=0 r=1

7. Probability that the server is busy with a priority customer t2 =

∞ N M

xijkK e

i=0 j=0 k=0

8. The probability that a priority customer is blocked from entering the system upon arrival as priority customer Pb1 =

∞ K N M

xijM r e

i=0 j=0 k=0 r=1

9. The probability that a priority customer is blocked from entering the system upon arrival ∞ K Pb2 = xiN M r e i=0 r=1

10. The overall rate of retrials at which the orbiting customers request service ∞ N K M RR = μ = μ xijkr e ∗

i=0

j=0 k=0 r=0

11. The successful rate of retrials ∗∗

SR = μ

=

∞ i=0

μ

(N −1) M K j=0 k=0 r=0

12. The fraction of successful rate of retrials F SR = μf r =

μ∗∗ μ∗

xijkr e

194

5

D. Babu et al.

Conclusion

In this paper, we considered the retrial version of a parallel processing queueing system with a probabilistic joining strategy for priority customers. Here, joining strategy for priority customers is only up to the maximum capacity of ordinary queue. Blocked priority customers leave the system forever but the blocked ordinary customers have the chance to enter into the ordinary queue after successful retrial. We intend to find the optimum values for p, N , K and M to minimise the loss of priority customers.

References 1. Artalejo, J.R., Gomez-Corral, A.: Retrial Queueing Systems: A Computational Approach. Springer, Berlin (2008). https://doi.org/10.1007/978-3-540-78725-9 2. Artalejo, J.R.: Accessible bibliography of research on retrial queues. Math. Comput. Modell. 30(3–4), 1–6 (1999) 3. Chakravarthy, S., Thiagarajan, S.: Two parallel queues with simultaneous services and Markovian arrivals. J. Appl. Math. Stochast. Anal. 10(4), 383–405 (1997) 4. Choi, B.D., Chang, Y.: MAP1, MAP2/M/c retrial queue with the retrial group of finite capacity and geometric loss. Math. Comput. Modell. 30, 99–113 (1999) 5. Dudin, S., Kim, C., Dudina, O.: MMAP/M/N queueing system with impatient heterogeneous customers as a model of a contact center. Comput. Oper. Res. 40(7), 1790–1803 (2013) 6. Falin, G.I.: On a multiclass batch arrival retrial queue. Adv. Appl. Probab. 20, 483–487 (1988) 7. Krishnamoorthy, A., Deepak, T.G., Joshua, V.C.: Queues with postponed work. Top 12, 375–398 (2004). https://doi.org/10.1007/BF02578967 8. Krishnamoorthy, A., Manjunath, A.S.: On priority queues generated through customer induced service interruption. Neural Parallel Sci. Comput. 23, 459–486 (2015) 9. Krishnamoorthy, A., Manjunath, A.S.: On queues with priority determined by feedback. Calcutta Stat. Assoc. Bull. 70, 33–56 (2018) 10. Krishnamoorthy, A., Joshua, V.C., Babu, D.: A token based parallel processing queueing system with priority. In: Vishnevskiy, V.M., Samouylov, K.E., Kozyrev, D.V. (eds.) DCCN 2017. CCIS, vol. 700, pp. 231–239. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-66836-9 19 11. Kulkarni, V.G.: Expected waiting time in a multi-class batch arrival retrial queue. J. Appl. Probab. 23, 144–154 (1986) 12. Latouche, G., Ramaswami, V.: Introduction to Matrix analytic Methods in Stochastic Modelling. Siam (1999) 13. Mathew, A.P., Krishnamoorthy, A., Joshua, V.C.: A retrial queueing system with orbital search of customers lost from an offer zone. In: Dudin, A., Nazarov, A., Moiseev, A. (eds.) ITMM/WRQ -2018. CCIS, vol. 912, pp. 39–54. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-97595-5 4 14. Neuts, M.F.: Matrix-Geometric Solutions in Stochastic Models - An Algorithmic Approach. The Johns Hopkins University Press, Baltimore (1981) 15. Takagi H.: Queueing Analysis. Volume 1: Vacations and Priority Systems. NorthHolland, Amsterdam (1991) 16. Wang, J., Zhang, F.: Strategic joining in M/M/1 retrial queues. Eur. J. Oper. Res. 230(1), 76–87 (2013)

A Disease Outbreak Managing Queueing System with Self-generation of Status and Random Clock for Quarantine Time T. S. Sinu Lal(B) , V. C. Joshua, and A. Krishnamoorthy Department of Mathematics, CMS College, Kottayam 686001, Kerala, India {sinulal,vcjoshua,krishnamoorthy}@cmscollege.ac.in http://www.cmscollege.ac.in

Abstract. We propose an efficient model of an epidemic management system with the notion of “self generation of status” and random clock for the quarantine period of a ‘suspected’ person (we designate them as ‘customers’). Customers arrive for check up according to a Markovian arrival process. They enter into a multi server station; assume that the chance of a person being tested as infected is p, independent of others; if he/she falls in this category that person is directed to a quarantine pool; else (with probability 1-p), the customer leaves the system for ever. For each customer in the quarantine pool, two random clocks start ticking upon his entry. One of the random clocks has Erlang distributed life time; this is the quarantine duration, on realization of which, the customer can leave the system. On the other hand, a customer in quarantine generates as infected in a time period, measured from the time of his/her entry into the pool; this time duration has a Coaxian distribution. This is the second clock. The customer leaves the system upon the realization of the Erlang clock. The decision based on the clocks are: the customer can leave the system upon the realization of the Erlang clock, provided the Coxian clock does not realize until then. If the customer has generated into the infected status before the realization of the Erlang clock (thatis, Coxian clock realizes before the Erlang clock), then he is transferred to the specially designed care unit of finite capacity. This system is modeled as a continuous time Markov chain and is analyzed using matrix analytic method. The main concern is on finding the optimal capacity of the care unit so that maximum number of infected are admitted, taking into consideration several risk factors. Keywords: Self generation of status Quarantine pool · Random clock

1

· Matrix analytic methods ·

Introduction

Probabilistic models of epidemic management systems have been a relevant area of research for the past several years. In this work, we develop an effective mathematical model for the management of epidemic outbreaks using queueing theoretical tools. We use the notion of self generation of status (of being infected or c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 195–205, 2020. https://doi.org/10.1007/978-3-030-66242-4_16

196

T. S. Sinu Lal et al.

not) from a pool of suspected persons. This is achieved using two independent random clocks, for each person in the pool, one for the self generation of status and the other for the termination of quarantine period. In [1] Trapman and Bootsma combines epidemiology and queueing theory and they establish a relation between the spread of infectious disease and dynamics of M |G|1 queues with processor sharing. Lopez-Garcia [2] analyses an SIR epidemic model for the disease spread throughout a small heterogeneous population of individuals and in this work two different orders for the state space of the underlying Markov chain yield a scalar and a matrix formalism. [3] Rania et al. gives a comprehensive and systematic review of mathematical models of disease transmission in healthcare settings and assess the application of contact and patient transfer network data over time and their impact on our understanding of transmission dynamics of infections. [4] also gives a useful model of disease infections. G´ omez-Corral, A. and L´opez-Garc´ıa [5], present a more detailed description of the underlying piecewise-deterministic Markov process (PDMP), from which, they analyze the population transmission number and the infection probability of a certain susceptible individual. In [6] Amador and G´ omez-Corral extreme values in an SIQS (susceptible infectious quarantined susceptible) model with two different states for quarantine and showed that the quarantine occupancy rate depends largely on the contact processes and the capacity of the quarantine compartment. Queueing models with priority generations can be seen in [7,8]. A queueing inventory system as an organ transplantation model has been studied in [9] and idea of random clock is used for modelling search and perishing times. [10] describes a multi server tandem queue with phase type services and is analyzed using matrix analytic methods. For more details of matrix analytic methods see [12,13]. Description of Markovian arrival process can be found in [14]. A phase type distribution is defined as the distribution of the time until absorption in a Markov process with a finite state space and a single absorption state defined over nonnegative real line. A phase type distribution with transient states {1, 2, . . . , m} and an absorbing state m + 1 is represented by a two tuple of the form (α, T ), where α is the probability vector of length m according to which the process  selects the  initial state from {1, 2, . . . , m} and T is an m × m T T0 generates the process, given the column vector T0 matrix such that 0 0 satisfies the condition Te + T0 = 0. (α, T) is called the representation of the phase type distribution. The distribution F of time until the chain gets absorbed into the state m + 1 is given by F (x) = 1 − αeTx e, x ≥ 0. In the coming sections, the mathematical model, stationary vector of the system process, performance characteristics and departure process of customers from the pool are included.

A Disease Outbreak Managing Queueing System with Self-generation

2

197

Mathematical Model

In this model customers arrive to the first station according to a MAP of order a. In the first station there are c identical servers whose service time follows an exponential distribution with parameter μ. If all the servers in the first station are busy then the arriving customers queue up in-front of the first station. At the first station a person is suspected to be infectious with a probability p and is sent to a quarantine pool of capacity N , other wise he can quit the system with the complimentary probability 1−p. When a person reaches the quarantine pool, two random clocks starts ticking. One of the clocks gives the time for generation of status (positive or negative) of disease for a particular person and the other upon realization gives the total quarantine time. The time for status generation are independent and identically distributed according to a Coaxian distribution of order h having phase type representation (α, C), where α = (1, 0, . . . , 0) is the initial probability distribution and C is matrix giving the transition rates among the m phases. C takes the form ⎤ ⎡ −ρ(1) q1 ρ(1) ⎥ ⎢ −ρ(2) q2 ρ(2) ⎥ ⎢ ⎥ ⎢ .. .. C=⎢ ⎥. . . ⎥ ⎢ ⎣ ρ(m − 1) qm−1 ρ(r − 1) ⎦ −ρ(m) where ρ(i), 1 ≤ i ≤ r − 1 is the rate of transition from the phase i to i + 1 and the process moves from the phase i to i + 1 with probability qi or enters the absorption state with the complimentary probability 1 − qi provided the initial phase is 1. The quarantine time follows an Erlang distribution of order g with density function. f (t) =

gμ(gμt)r−1 e−gμt , t ≥ 0, μ > 0. (g − 1)!

If a person is found positive then, he is sent to a special care unit with M identical servers, each with phase type distributed service times. The process governing the system can be modeled as a continuous time Markov chain {X (t), t ≥ 0} X (t) = (N (t), m(t), e(t), c(t), s(t), a(t), t ≥ 0) The notations in the above definition are described below. • N (t) – Number of customers in the first stage. This includes the total count of customers in the queue along with those who are being served at the first station. • m(t) – Number of customers in the quarantine pool, 0 ≤ m(t) ≤ N . • e(t) = (e1 (t), e2 (t), ..., eg (t)), where ei (t) is the number of Erlang clocks staying in the ith phase.

198

T. S. Sinu Lal et al.

• c(t) = (c1 (t), c2 (t), ..., ch (t)), where ck (t) is the number of Coxian clocks staying in the k th phase. • s(t) = (s1 (t), s2 (t), ..., sr (t)), where si (t) is the number of servers at the second stage staying in the ith phase of service. • a(t) – Phase of MAP. The state space S of the system is described below. S = ∪∞ i=0 L(i) Where L(i) = L1 (i) ∪ L2 (i) ∪ L3 (i) L1 (i) = {(i, 0, j), 1 ≤ j ≤ a} L2 (i) = {(i, j, (e1 , e2 , ..., eg ), (c1 , c2 , ..., ch ), k), 0 ≤ j ≤ N, 1 ≤ ci , ei ≤ N, 1 ≤ k ≤ a}

L3 (i) = {(i, j, (e1 , e2 , ..., eg ), (c1 , c2 , ..., ch ), (s1 , s2 , ..., sr ), k), 0 ≤ j ≤ N, 1 ≤ ci , ei ≤ N, 1 ≤ si ≤ M, 1 ≤ k ≤ a}. The infinitesimal generator takes the following form. ⎤ ⎡ A00 A0 ⎥ ⎢ A10 A11 A0 ⎥ ⎢ ⎥ ⎢ . . . .. .. .. ⎥ ⎢ ⎥. Q=⎢ ⎥ ⎢ Ac−10 Ac−11 A0 ⎥ ⎢ ⎥ ⎢ A0 A1 A0 ⎦ ⎣ .. .. .. . . . The block submatrices are described below. For 1 ≤ i ≤ c − 1, Ai−11 = i(1 − p)μI + A∗i , A∗i =



0 ipμI . For 1 ≤ i ≤ c − 1, 0 0

A0 = I ⊗ D0 For the sake of convenience we again devide the states in L2 (i) and L3 (j) further L2 (i, l) and L3 (j, k), where 0 ≤ i, j ≤ N. Lh (i, l) is the group of states in the level i, for which l customers are in the pool for h = 1, 2.

L1 (0)

Ψ0 ⎢ L2 (i, 0)⎢Φ1 Ψ1 Θ1 ⎢ .. . .. ⎢ . ⎢ ⎢ ) ΦN ΨN Aii = L2 (i, N ⎢ ⎢ L3 (i, 0)⎢Λ∗ ⎢ L3 (i, 1)⎢ Λ ⎢ ⎢ L3 (i, 2)⎢ Λ1 ⎢ .. .. ⎣ . . L3 (i, N )

...

L3 (i, N )

L3 (i, 1)

L3 (i, 0)

...

L2 (i, N )



L2 (i, 0)

L1 (0)

A Disease Outbreak Managing Queueing System with Self-generation

199



⎥ ⎥ ⎥ .. ⎥ . ⎥ ΘN ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ .. ⎦ . Λ d Ψb

In this model customers arrive to the first station according to a MAP of order a. In the first station there are c identical servers whose service time follows an exponential distribution with parameter μ. If all the servers in the first station are busy then the arriving customers queue up in-front of the first station. At the first station a person is suspected to be infectious with a probability p and is sent to a quarantine pool of capacity N , other wise he can quit the system with the complimentary probability 1−p. When a person reaches the quarantine pool, two random clocks starts ticking. One of the clocks gives the time for generation of status (positive or negative) of disease for a particular person and the other upon realization gives the total quarantine time. The time for status generation are independent and identically distributed according to a Coaxian distribution of order h having phase type representation (α, C), where α = (1, 0, . . . , 0) is the initial probability distribution and C is matrix giving the transition rates among the m phases. C takes the form ⎤ ⎡ −ρ(1) q1 ρ(1) ⎥ ⎢ −ρ(2) q2 ρ(2) ⎥ ⎢ ⎥ ⎢ .. .. C=⎢ ⎥. . . ⎥ ⎢ ⎣ ρ(m − 1) qm−1 ρ(r − 1) ⎦ −ρ(m) where ρ(i), 1 ≤ i ≤ r − 1 is the rate of transition from the phase i to i + 1 and the process moves from the phase i to i + 1 with probability qi or enters the absorption state with the complimentary probability 1 − qi provided the initial phase is 1. The quarantine time follows an Erlang distribution of order g with density function. f (t) =

gμ(gμt)r−1 e−gμt , t ≥ 0, μ > 0. (g − 1)!

200

T. S. Sinu Lal et al.

If a person is found positive then, he is sent to a special care unit with M identical servers, each with phase type distributed service times. The process governing the system can be modeled as a continuous time Markov chain {X (t), t ≥ 0} X (t) = (N (t), m(t), e(t), c(t), s(t), a(t), t ≥ 0) The notations in the above definition are described below. • N (t) – Number of customers in the first stage. This includes the total count of customers in the queue along with those who are being served at the first station. • m(t) – Number of customers in the quarantine pool, 0 ≤ m(t) ≤ N . • e(t) = (e1 (t), e2 (t), ..., eg (t)), where ei (t) is the number of Erlang clocks staying in the ith phase. • c(t) = (c1 (t), c2 (t), ..., ch (t)), where ck (t) is the number of Coxian clocks staying in the k th phase. • s(t) = (s1 (t), s2 (t), ..., sr (t)), where si (t) is the number of servers at the second stage staying in the ith phase of service. • a(t) – Phase of MAP. The state space S of the system is described below. S = ∪∞ i=0 L(i) Where L(i) = L1 (i) ∪ L2 (i) ∪ L3 (i) L1 (i) = {(i, 0, j), 1 ≤ j ≤ a} L2 (i) = {(i, j, (e1 , e2 , ..., eg ), (c1 , c2 , ..., ch ), k), 0 ≤ j ≤ N, 1 ≤ ci , ei ≤ N, 1 ≤ k ≤ a}

L3 (i) = {(i, j, (e1 , e2 , ..., eg ), (c1 , c2 , ..., ch ), (s1 , s2 , ..., sr ), k), 0 ≤ j ≤ N, 1 ≤ ci , ei ≤ N, 1 ≤ si ≤ M, 1 ≤ k ≤ a}. The infinitesimal generator takes the following form. ⎤ ⎡ A00 A0 ⎥ ⎢ A10 A11 A0 ⎥ ⎢ ⎥ ⎢ .. .. .. ⎥ ⎢ . . . ⎥. ⎢ Q=⎢ ⎥ A A A c−10 c−11 0 ⎥ ⎢ ⎥ ⎢ A A A 0 1 0 ⎦ ⎣ .. .. .. . . . The block submatrices are described below. For 1 ≤ i ≤ c − 1, Ai−11 = i(1 − p)μI + A∗i , A∗i = A0 = I ⊗ D0



0 ipμI . For 1 ≤ i ≤ c − 1, 0 0

A Disease Outbreak Managing Queueing System with Self-generation

201

...

L3 (i, N )

L3 (i, 1)

L3 (i, 0)

...

L2 (i, N )

L2 (i, 0)

L1 (0)

For the sake of convenience we again devide the states in L2 (i) and L3 (j) further L2 (i, l) and L3 (j, k), where 0 ≤ i, j ≤ N. Lh (i, l) is the group of states in the level i, for which l customers are in the pool for h = 1, 2.

⎤ Ψ0 ⎥ L2 (i, 0)⎢ Θ1 ⎥ ⎢Φ1 Ψ1 ⎥ ⎢ .. .. .. ⎥ ⎢ . . . ⎥ ⎢ ⎢ ) ΦN ΨN ΘN ⎥ Aii = L2 (i, N ⎢ ⎥ ⎥ ⎢ ⎥ L3 (i, 0)⎢Λ∗ ⎥ ⎢ ⎥ ⎢ L3 (i, 1)⎢ Λ ⎥ ⎥ ⎢ L3 (i, 2)⎢ Λ1 ⎥ ⎥ ⎢ .. .. .. ⎦ ⎣ . . . L3 (i, N ) Λ d Ψb L1 (0)



L1 (1) corresponds to the states in the first level and has no customers in the pool or in the second station. Hence the transitions L1 (1) → L1 (1) are due to transitions in MAP without generating arrivals. Ψ0 = D0 ⎡

ϕϑ ⎢ ϕ ⎢ Ψi = ⎢ .. ⎣ .ϑ ϕ

⎤ ⎥ ⎥ ⎥ , 1 ≤ i ≤ N. ⎦

where ϕ = iC ⊕ D0 , ϑ = iμI. ⎤ (1 − q)θ1 I ⎢ (1 − q)θ2 I ⎥ ⎥ ⎢ ⎥ ⎢ .. Θi = i ⎢ ⎥ , 1 ≤ i ≤ N. . ⎥ ⎢ ⎦ ⎣ θm I I ⎡

Φi = e ⊗ I, 1 ≤ i ≤ N. For N ≤ i ≤ b,

202

T. S. Sinu Lal et al.



ϕ∗ ϑ∗ ⎢ ϕ∗ ⎢ Ψi = ⎢ .. ⎣ . ϑ∗ ϕ∗

⎤ ⎥ ⎥ ⎥ , 1 ≤ i ≤ N. ⎦

ϕ∗ = (iC ⊕ S) ⊕ D0 , ϑ∗ = iμI. Λ∗ = e ⊗ S 0 ⊗ I. ⎡ ⎤ U00 U01 U0w ⎢ ⎥ ⎢ ⎥ Λ=⎢ . ⎥ , 1 ≤ i ≤ N. . .. ⎣ .. ⎦ Uww Uw0 Uw1

Theorem 1. The Markov chain described above is stable if and only if c ∞

πi Ir ⊗ D1 < cμ

i=0 i=0

where π = (π0 , π1 , ..., πN ) is the stationary vector of the generator A = A1 + A2 + A 0 .

3

Stationary Vector

With the assumption of the stability condition, the steady state probability distribution exists. Let x = (x0 , x1 , x2 , ...) be the steady state probability vector of the Markov Chain X (t). Then x is the unique solution to the system of equations xQ = 0 and xe = 1. From xQ = 0 and xe = 1, we get the system of equations as x0 A00 + x1 A10 = 0 x0 A0 + x1 A11 + x2 A20 = 0 .. . xc−1 A0 + xc A1 + xc+1 A2 = 0 xi A0 + xi+1 A1 + xi+2 A2 = 0, i ≥ c Now from Matrix analytic methods, xc+i = xc Ri , i = 0, 1, 2 . . ., where R is the minimal nonnegative solution the matrix quadratic equation R2 A2 + RA1 + A0 = 0. R is computed algorithmically, using the logarithmic reduction algorithm [11]. For i = 1, 2, . . . , c, xi = xi−1 A0 (Ai1 + Hi+1 Ai+10 ). Where Hc = −A0 (A1 + RA2 )−1 , for i = 1, 2, . . . , c − 1, Hi = −A0 (Ai1 + Hi+1 Ai+10 ). Finally we reach

A Disease Outbreak Managing Queueing System with Self-generation

203

at x0 (A00 + H1 A10 ) = 0. Hence x0 is obtained as the steady state distribution of a Markov chain on a finite state space, having the infinitesimal generator + H1 A10 . x is calculated by dividing each xi with the normalizing constant A

00 ∞ i=0 xi e.

4

Performance Characterestics

• Probability that the system is empty. Pem = x00 e • Probability that pool is full. Ppf =



xiN e

i=0

• Probability that there are k customers in pool and l customers are being served. ∞ Pkl = xkl e i=0

• Expected number of customers in the queue. Eq =



ixi e

i=0

• Expected number of busy servers in the first stage. Es1 =

K

ixi e + K

i=0

5



xi e.

i=0

Departure Process of Customers from Pool

We define {ξm , m ≥ 0} as the departure process of the customers from the pool. ξm is a time at which a customer leaves the pool due to the realization of the Erlang clock or due to self generation of status and ξ0 = 0. To analyse the ∗ = ξm − ξm−1 . The positive process ξm , we consider the inter departure times ξm recurrence of X ensures that the random variables ξ1 , ξ2 , ... are independent and identically distributed. Hence if is enough to find the distributions of ξ0 and ξ1 . Suppose that the distribution of ξ1∗ is F given by F (t) = P (ξ1∗ ≤ t) Let the Laplace Steilges transform of ξ1∗ be ∗

Γ (s) = E(e−sξ1 ), Re(s) ≥ 0.

204

T. S. Sinu Lal et al.

Depending on the state of the process at ξ0 , the distribution F may be written as F (t) = Γ (s) =

∞ i=0 ∞

x (i )Fi (t) x (i )Γi (s)

i=0

where Fi is the conditional distribution of ξ1 and Γi (s) is the conditional Laplace Steilges transform conditioning on the fact that the process is at the level i at the epoch ξ0 . Since the process X is level independent, the distributions F0 , F1 , F2 ... and Γ0 , Γ1 , Γ2 , ... are identical. Clearly the departure process is independent of the arrivals at first station. Hence any time ξi , i ≥ 1 can be thought of as the time until absorption takes place in the continuous time Markov chain Z ∗ on the finite state space S ∗ = {#} ∪ {(i, j)}. The corresponding infinitesimal generator takes the form

0 0 # . Q = N M where M = diag(M1 , M2 , ..., Mm ), N = [z, n]T The transitions in Z ∗ are either due to the realization of Erlang clock or due to the self generation of priority in the pool. The arrivals in Z has no effect but a sojourn in the current state of Z ∗ . So Hence each ξi gas a phase type representation (α∗ , Hm) The k th entry of Fi denoted by Fik may be obtained as. Fik (t) = 1 − α∗ (e Mt )e so Fi (t) = e − (exp(Mt))e Also the Laplace transform Γi is given by Γi (s) = α∗ (sI − M)−1 N e.

6

Conclusion

This paper proposes an effective Mathematical model for a disease outbreak management system in terms of queueing theoretic tools. The system is equipped with a quarantine pool and two random clocks giving the durations for status generation and quarantine time. Stability condition is derived and stationary distribution is obtained. Performance characteristics are also given. The departure process of customers from the pool is also studied. Acknowledgment. Sinu Lal T S thanks University Grants Commission (UGC) of India for UGC-Junior Research Fellowship (Roll no.-432693, June 2017).

A Disease Outbreak Managing Queueing System with Self-generation

205

References 1. Trapman, P., Bootsma, M.C.J.: A useful relationship between epidemiology and queueing theory: the distribution of the number of infectives at the moment of the first detection. Math. Biosci. 219(1), 15–22 (2009) 2. Lopez-Garcia, M.: Stochastic descriptors in an SIR epidemic model for heterogeneous individuals in small networks. Math. Biosci. 271, 42–61 (2016) 3. Assab, R., et al.: Mathematical models of infection transmission in healthcare settings: recent advances from the use of network structured data. Curr. Opin. Infect. Dis. 30(4), 410–418 (2017) 4. Lopez Garcia, M., Aruru, M., Pyne, S.: Health analytics and disease modeling for better understanding of healthcare-associated infections. BLDE Univ. J. Health Sci. 3(2), 69–74 (2018) 5. G´ omez-Corral, A., L´ opez-Garc´ıa, M.: On SIR epidemic models with generally distributed infectious periods: number of secondary cases and probability of infection. Int. J. Biomathematics 10(02), 1750024 (2017) 6. Amador, J., G´ omez-Corral, A.: A stochastic epidemic model with two quarantine states and limited carrying capacity for quarantine. Phys. A Stat. Mech. Appl. 544, 121899 (2020) 7. Krishnamoorthy, A., Narayanan, V.C., Chakravarthy, S.R.: The impact of priority generations in a multi-priority queueing system-a simulation approach. In: Proceedings of the 2009 Winter Simulation Conference (WSC), pp. 1622–1633. IEEE (2009) 8. G´ omez-Corral, A., Krishnamoorthy, A., Narayanan, V.C.: The impact of selfgeneration of priorities on multi-server queues with finite capacity. Stoch. Models 21(2–3), 427–447 (2005) 9. Sinu Lal, T.S., Krishnamoorthy, A., Joshua, V.C.: A queueing inventory system with search and match - an organ transplantation model. In: Vishnevskiy, V.M., Samouylov, K.E., Kozyrev, D.V. (eds.) DCCN 2019. CCIS, vol. 1141, pp. 273–287. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-36625-4 22 10. Sinu Lal, T.S., Krishnamoorthy, A., Joshua, V.C.: A multiserver tandem queue with a specialist server operating with a vacation strategy. Matematicheskaya Teoriya Igr i Ee Prilozheniya 11(3), 31–52 (2019) 11. Latouche, G., Ramaswami, V.: Introduction to matrix analytic methods in stochastic modeling, vol. 5. SIAM (1999) 12. Neuts, M.F.: Matrix-Geometric Solutions in Stochastic Models: An Algorithmic Approach. Courier Corporation (1994) 13. Neuts, M.F.: Probability distributions of phase type. Liber Amicorum Prof. Emeritus H, Florin (1975) 14. Neuts, M.F.: A versatile Markovian point process. J. Appl. Probab. 16(4), 764–779 (1979)

Stochastic Optimization of Local Purchase Quantities in a Geo/Geo/1 Production Inventory System K.P. Jose1(B) and M.P. Anilkumar2 1

Department of Mathematics, St. Peter’s College, Kolenchery 682 311, Kerala, India [email protected] 2 Department of Mathematics, T.M. Govt. College, Tirur 676 502, Kerala, India [email protected]

Abstract. We consider an (s, S) production inventory system in which demand occurs according to a Bernoulli process and service time follows a geometric distribution. The maximum inventory that can be accommodated in the system is S. When the on-hand inventory is reduced to a preassigned level of s due to service completion (and consequent purchase of exactly one item by each customer), production is started. The production time for each item (inter-production time) follows a geometric distribution. When the inventory level becomes zero, an instantaneous local purchase of one/s/S units is made to meet the demand. These three types of local purchases are discussed as three separate models. Using the closed-form solution obtained for the steady-state probability vector and by constructing an appropriate cost function, we compare these models with the help of a few numerical work. Keywords: Discrete-time production inventory · Bernoulli process Geometric distribution · Matrix-Analytic Method

1

·

Introduction

Queueing inventory with positive service time was introduced by Sigman and Simchi-Levi [23] in which demand arrives under a Poisson process and service time follows an arbitrary distribution. Melikov and Molchanov [16] also considered positive service time on calculating optimal stock reorder policies for transportation/storage systems in which exact as well as approximate solution methods are analysed. Later, queueing systems with inventory have been studied by several researchers. Krishnamoorthy and Jose [7] compared three retrial queueing inventory systems and analysed them using Matrix-Analytic Method. A study on developments in queueing inventory was done by Krishnamoorthy et al. [8]. Recent developments in queueing inventory with positive service time are mentioned in Krishnamoorthy et al. [10]. Berman et al. [4] introduced the processing time of inventory with deterministic service. This resulted in the situation for the analysis of queueing inventory c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 206–220, 2020. https://doi.org/10.1007/978-3-030-66242-4_17

Stochastic Optimization of Local Purchase

207

system in which demands occur when inventory is stock out. In the production inventory system with positive service time and no restriction for customers to enter in the system when the inventory level zero is analysed by Krishnamoorthy and Narayanan [9]. The authors assumed that the server goes on vacation when either there is no inventory or no customers present. The First reported work on product form solution in queueing inventory is of Schwarz et al. [21] in which the authors assumed different policies. The product form solution to this model is obtained only with the assumption that no customers are allowed to enter the system when the inventory level is zero. Later, there are few papers with product form solutions in queueing inventory system with positive service time and zero lead time. These works are mentioned in the survey paper by Krishnamoorthy et al. [8]. Schwarz and Daduna [20] developed approximation for performance measures in the M/M/1 queueing system in which the issue of inventory is considered as service with the assumption that customers can join in the system even when the inventory level is zero. To overcome the loss of customers, due to the lack of inventory in the product form solutions, Schwarz et al. [22] considered a queueing inventory model in which product form solution is obtained with the assumption that the demand that occurs during the stock out period is re-routed to other service stations. Instantaneous replenishment during the stock out the period with high replenishment cost is considered by Saffari and Haji [19] to obtain the product form solution. M/M/1 queueing inventory system under (r, Q) policy analyzed by Saffari et al. [18] in which, demand during the stock out period was assumed to be lost. An explicit expression for long-run performance measures was obtained and carried out cost optimization. The investigation of stochastic decomposition of production (s, S) inventory system in continuous time received much attention from researchers since Krishnamoorthy and Viswanath [12]. To get the explicit expression for the steady-state distribution, the authors restricted the entry of customers according to the inventory level. They obtained an explicit expression for the production cycle and optimized the cost function associated with the model with respect to maximum storage S. Deepthi [6] extended this model to discrete-time. Krishnamoorthy et al. [11] optimized N in (s, Q) inventory system in continuous time so that local purchase of N + Q items is done when the on-hand inventory level is s − N . Recently, Krishnamoorthy et al. [13] also considered a continuous-time (s, S) production inventory system with positive service time and obtained stochastic decomposition of the system by introducing one unit of local purchase during the stock out period. This paper analyses the quantity of instantaneous replenishment during the stock out period. All the mentioned works on product form solutions are studied on the continuous-time setup. Notable work on the discrete-time queue is done by Meisling [15]. Dafermos and Neuts [5] approximated a continuous-time model by a discrete-time single server queueing model as a limiting case. Lian et al. [14] introduced inventory in a discrete-time inventory system having a common life. Recently, Anilkumar and Jose [3] Analysed a discrete-time production (s, S) inventory system with the

208

K.P. Jose and M.P. Anilkumar

interruption during service. We use the discrete version of the Matrix-Analytic Method (MAM), explained in Alfa [1,2], to analyse the model. For elementary details of MAM, one can refer to Neuts [17]. The present paper is an attempt to avoid the loss of customers in the paper by Krishnamoorthy and Viswanath [12]. This is achieved by introducing local purchases in a discrete-time setup and obtained a closed-form solution. During the stock out period, one unit, s units or S unit is locally purchased with the high cost and these are studied in three different models. In the first two cases, the replenishment order is not canceled whereas in the third case it is canceled. These three models are compared based on a suitable cost function and determined the best model. The rest of the paper is organized as follows. Sections 2, 3 and 4 provide mathematical modeling analysis, Stability condition is derived in section Steadystate probability vector and it’s an explicit expression of models I, II and III. The probability of the number of times the local purchase is done during a specified time is discussed in Sect. 5. The relevant performance measures and their explicit forms are included in Sect. 6. Finally, Sect. 7 contains numerical experiments.

2

Model 1

In model I, we consider a single server (s, S) production inventory system in which the arrival of customers at each slot could only be singly with probability p > 0 (Bernoulli arrival process) so that the inter-arrival time follows geometric distribution with parameter p. The service time duration for each customer follows geometric distribution with parameter q > 0. Each customer receives one inventory after completing the service. When the inventory level depletes s due to demands, production starts. The production time of the individual item in the inventory follows a geometric distribution with parameter r. The production is stopped when the inventory is reached to the maximum level of S. We assume that arrival and service completion occurs at the beginning of the slot boundary and production of the individual item takes place at the end of the slot boundary. In any epoch, if the inventory level becomes zero due to service and production lag, an instantaneous local purchase of one unit is made with high purchasing cost. Notations N (n) : Number of customers in queue at an epoch n. I(n) : Inventory level at the epoch n.  0, when production is off C(n) : The production status, which is 1, when the production is on x ¯ : 1 − x, for 0 ≤ x ≤ 1. Then {(N (n), I(n)), c(n); n = 0, 1, 2, 3, ..} is a Quasi Birth Death process with state space {(i, j); 1 ≤ j ≤ s} ∪ {(i, j, k); s + 1 ≤ j ≤ S − 1, k = 0, 1} ∪ {(i, S)}, for i ≥ 0

Stochastic Optimization of Local Purchase

209

We consider order the state space as the dictionary order. Now, the transition probability matrix of the process is given by, ⎡ ⎤ D1 D0 ⎢ A2 A1 A0 ⎥ ⎢ ⎥ , P1 = ⎢ A2 A1 A0 ⎥ ⎣ ⎦ .. .. .. . . . where, the blocks D0 , D1 , A0 , A1 and A2 square matrix of order 2S − s − 1 and are given ⎡ by ⎤ p¯ r pr

⎢ ⎥ .. .. ⎢ ⎥ with D00t = 0 pr , . . ⎢ ⎥ ⎢ ⎥ 1 p¯ r D00t ⎢ ⎥ D0 = p 0 , 1 0 ⎥ D D 0 p¯ r D0 = ⎢ 0 0 ⎢ ⎥ ⎢ ⎥ . . 0 0 0 .. .. 0b ⎢ ⎥ D0 = ,D0 = ⎢ ⎥ 0 0 pr pr ⎣ D01 D00b ⎦ p p¯ D0 , A0 = q¯D0 p ⎡  t p¯q¯r ⎢pq¯ ⎢ r t p¯q¯r ⎢ .. .. .. ⎢ . . . ⎢ ⎢ pq¯ r t A0t 1 ⎢ 1 A2t A1 = ⎢ 1 A1 ⎢ ⎢ A21 ⎢ ⎢ ⎢ ⎢ ⎣ D1 =



A01 A11 .. .

⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ A01 ⎥ ⎥ .. .. ⎥ . . ⎥ 2 1 0b ⎦ A1 A1 A1 A2b ¯q¯ 1 p ⎤



p¯q ⎢p¯q¯ ⎢ r p¯qr ⎢ .. .. ⎢ . . ⎢ ⎢ p¯q¯ r p¯qr A2 = ⎢ 1 ⎢ A2t 2 A2 ⎢ ⎢ A22 A12 ⎢ ⎣ A22 A12 A2b 2 2.1

with t = pq + p¯q¯r¯, t = p¯q¯r¯ + pqr 0 0 0 0b 0 A1 = , A1 = p¯q¯r 0 p¯q¯r

pq 0 pq 0 A21 = , A2b 1 = 0 pq¯ r

¯q¯r A0t 1 = 0 p p¯q¯ 0 A11 = 0 p¯q¯r¯ + pqr

0

⎥ with A2t = p¯q , ⎥ 2 ⎥ 0 ⎥ ⎥ A1 = 0 0 , ⎥ 2 0 p¯qr ⎥ ⎥ p¯q 0 ⎥ 2 ⎥ A2 = 0 0

⎥ ⎦ 2b A2 = p¯q 0

Stability Condition

Theorem 1. The above system is stable, if and only if p < q.

210

K.P. Jose and M.P. Anilkumar

Proof. Consider the matrix A = A0 + A1 + A2 . Then, we have ⎡ q¯r¯ + q ⎢ q¯ ⎢ r ⎢ ⎢ ⎢ ⎢ ⎢ A=⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎣

⎤ with u∗ = q¯r¯ + qr, ⎥ A0b = 0 , A0 = 0 0 , ⎥ q¯r 0 q¯r ⎥ ⎥

⎥ 2 q 0 ⎥A = , A2b = q 0 ⎥ 0 q¯ r ⎥

⎥ 0t ⎥ A = 0 q¯r , A2t = q , ⎥ q¯ r ⎥ ⎥ ⎥ A1 = q¯ 0 0 u∗ A2 A1 A0b ⎦ 2b A q¯

q¯r u∗ q¯ r .. .. .. . . . q¯ r u∗ A0t A2t A1 A0 A2 A1 A0 .. .. .. . . .

Let Ψ = (ψ1 , . . . , ψs , ψs+1,0 , ψs+1,1 , . . . , ψS−1,0 , ψS−1,1 , ψS ) be the steady-state probability vector of A. Then, Ψ is obtained by solving Ψ A = Ψ and Ψ e = 1, which leads to ψj =

q (1 − v S−s )v s−j ψS for 1 ≤ j ≤ s, (r − q)

ψS =

(1 − v)(r − q) , q(v S − v s ) + r(1 − v)(S − s)

q (1 − v S−j )ψS for s + 1 ≤ j ≤ S − 1, r−q q¯ r = ψs+2,0 = · · · = ψS−1,0 = ψS , where v = . q¯r

ψj,1 = ψs+1,0

The Markov chain considered above is stable if and only if the mean left drift exceeds the mean right drift (see Neuts [17]). That is, Ψ A0 e < Ψ A2 e. On simplification, we get p¯ q < p¯q, which leads to p < q.   2.2

Steady-State Analysis

To find the steady-state probability vector of P , consider the production inventory system with negligible service time. Then, the corresponding Markov chain (j(n), c(n)) having the finite state space given by ∪sj=1 {j} ∪ ∪S−1 i=s+1 {(j, 0), (j, 1)} ∪ S The transition probability matrix p 1 is given by

Stochastic Optimization of Local Purchase

⎡ p¯r¯ + p ⎢ p¯ ⎢ r ⎢ ⎢ ⎢ ⎢ ⎢ p 1 = ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎣

⎤ p¯ r ⎥ t∗ p¯ r ⎥ ⎥ .. .. .. ⎥ . . . ⎥ ∗ 0t ⎥ p¯ r t E ⎥ 2t 1 0 ⎥ E E E ⎥ 2 1 0 ⎥ E E E ⎥ ⎥ .. .. .. ⎥ . . . ⎥ E 2 E 1 E 0b ⎦ E 2b p¯

211

with t∗ = p¯ r¯ + pr 0 0 0 0b 0 E = ,E = p¯r 0 p¯r

p 0 E2 = , E 2b = p 0 0 p¯ r

p E 0t = 0 p¯r , E 2t = p¯ r p¯ 0 E1 = 0 p¯r¯ + pr

(1) (1) (1) (1) (1) (1) (1)

(1) = ( Let Π π1 , . . . , π

s , π

s+1,0 , π

s+1,1 , . . . , π

S−1,0 , π

S−1,1 , πS ) be the steadystate probability vector of P 1 .

(1) and Π

(1) e = 1 leads to

(1) P 1 = Π Simplifying the expressions Π (1)

π

j

=

p (1) (1 − k S−s )k s−j π

S for 1 ≤ j ≤ s, (r − p)

(1 − k)(r − p) , p(i − k − k s+1 + k S+1 ) + r(1 − k)(S − s) p (1) (1) (1 − k S−j ) π

j,1 = πS for s + 1 ≤ j ≤ S − 1, r−p p¯ r (1) (1) (1) (1)

s+2,0 = · · · = π

S−1,0 = π

S , where k = . π

s+1,0 = π p¯r (1)

π

S =

Theorem 2. The steady-state probability vector Π (1) = (π0 , π1 , π2 , . . . ) of P is given by ⎧ q − p (1) ⎪ ⎨( )Π for i = 0 (1) q πi = (1) q − p p i−1 (1) ⎪ ⎩( ) ρ 4Π for i ≥ 1 q p¯q p¯ q where ρ = . p¯q Proof. From the structure of the transition probability matrix P and P , we have D1 +

p A2 = P 1 p¯q

p¯q D0 + A1 + p p¯q A0 + A1 + p¯ q

p¯ q A2 = P 1 p¯q p¯ q A2 = P 1 p¯q

212

K.P. Jose and M.P. Anilkumar

Now q − p (1) p )Π (D1 + A2 ) q p¯q q − p (1) q − p (1) (1) )Π P1 = ( )Π = π0 =( q q q − p p (1) p¯q p¯ q (1) (1) (1) ) Π ( D0 + A1 + A2 ) π0 D0 + π1 A1 + π2 A2 = ( q p¯q p p¯q q − p p (1) (1) ) Π P1 = π1 =( q p¯q and fori ≥ 2, q q − p p p¯ q (1) (1) (1)

(1) ( p¯q A0 + A1 + p¯ ) ( )i−1 Π A2 ) πi−1 A0 + πi A1 + πi+1 A2 = ( q p¯q p¯q p¯ q p¯q q q − p p p¯

(1) P 1 = πi ) ( )i−1 Π =( q p¯q p¯q (1)

(1)

π0 D1 + π1 A2 = (

Hence we have Π (1) P = Π (1) , and on summing, we have Π (1) e = 1.

3

 

Model II

In Model II, we consider all the assumptions in the previous model except that, in any epoch, if the inventory level becomes zero due to service and production lag, an instantaneous local purchase of s unit is made with high purchasing cost without canceling the production order. Then, as before, {(N (n), I(n)), c(n); n = 0, 1, 2, 3, ..} is a Quasi Birth Death process with state-space {(i, j); 1 ≤ j ≤ s} ∪ {(i, j, k); s + 1 ≤ j ≤ S − 1, k = 0, 1} ∪ {(i, S)}, for i ≥ 0 We order the state-space as the dictionary order. The transition probability matrix of the process is given by, ⎡ ⎤ D1 D0 ⎢ B2 B1 A0 ⎥ ⎢ ⎥ P2 = ⎢ ⎥, B B A 2 1 0 ⎣ ⎦ .. .. .. . . . The blocks B1 and B2 square matrix of order 2S − s − 1 and are given by ⎧ ⎪ ⎨p¯q¯r¯ + pqr for i = 1, j = 1 [B1 ]ij = pq¯ r for i = 1, j = s ⎪ ⎩ [A1 ]ij otherwise ⎧ ⎪ for i = 1, j = 1 ⎨p¯qr [B2 ]ij = p¯q¯ r for i = 1, j = s ⎪ ⎩ [A2 ]ij otherwise The blocks D0 , D1 and D2 are as in Model I. There is no change in the stability condition. That is, the system is stable, if and only if p < q.

Stochastic Optimization of Local Purchase

3.1

213

Steady State Analysis

Assuming the service time is negligible, the corresponding Markov chain has state space (j(n), c(n)) having the finite state space given by ∪sj=1 {j} ∪ ∪S−1 i=s+1 {(j, 0), (j, 1)} ∪ S Corresponding transition probability matrix p 2 is given by ⎧ ⎪ ⎨p¯r¯ + pr for i = 1, j = 1 [ p2 ]ij = p¯ r for i = 1, j = s ⎪ ⎩ [ p1 ]ij

(2)

(2) (2) (2) (2) (2) (2) (2)

(2) = ( π1 , . . . , π

s , π

s+1,0 , π

s+1,1 , . . . , π

S−1,0 , π

S−1,1 , πS ) be the steadyLet Π state probability vector of P 2 .

P = Π

and Π

(2) e = 1 leads to Simplifying the expressions Π (2)

π

i

=

p(k s − k S )(1 − k i ) (2) π

for 1 ≤ j ≤ s, (r − p)(1 − k s )k s S

(2)

π

S = (2)

π

j,1 = (2)

(1 − k s )(r − p) , r(1 − k s )(S − s) − ps(k S − k s )

p (2) (1 − k S−j ) πS for s + 1 ≤ j ≤ S, r−p (2)

(2)

(2)

s+2,0 = · · · = π

S−1,0 = π

S , where k = π

s+1,0 = π (2)

p¯ r . p¯r (2)

(2)

Theorem 3. The steady-state probability vector Π (2) = (π0 , π1 , π2 , . . . ) of P2 is given by ⎧ ⎪( q − p ) ⎨ π (2) for i = 0 (2) q πi = (3) q − p p i−1 ⎪ ⎩( ) ρ 4 π for i ≥ 1 q p¯q p¯ q where ρ = . p¯q

4

Model III

In this case, we conser all the assumptions in the Model I except that, in any epoch if the inventory level becomes zero due to service and production lag, an instantaneous local purchase of S unit is made with high purchasing cost by canceling the production order.

214

K.P. Jose and M.P. Anilkumar

Then, {(N (n), I(n)), c(n); n = 0, 1, 2, 3, ..} is a Quasi Birth-Death process with state space mentioned above. Now, the transition probability matrix of the process is given by, ⎡ ⎤ D1 D0 ⎢ C2 C1 A0 ⎥ ⎢ ⎥ P3 = ⎢ ⎥, C C A 2 1 0 ⎣ ⎦ .. .. .. . . . where, the blocks C1 and C2 square ⎧ ⎪ r ⎨pq¯ [C1 ]ij = 0 ⎪ ⎩ [B1 ]ij ⎧ ⎪ r ⎨p¯q¯ [C2 ]ij = 0 ⎪ ⎩ [B2 ]ij

matrix of order 2S − s − 1 and are given by for i = 1, j = 2S − s − 1 for i = 1, j = s otherwise for i = 1, j = 2S − s − 1 for i = 1, j = s otherwise

As in the above case, the system is stable if and only if p < q. 4.1

Steady State Analysis

Assuming the service time is negligible, then the corresponding Markov chain has state space (j(n), c(n)) having the finite state space given by ∪sj=1 {j} ∪ ∪S−1 i=s+1 {(j, 0), (j, 1)} ∪ S Corresponding transition probability matrix p 3 is given by  p¯ r for i = 1, j = s [ p3 ]ij = [ p2 ]ij otherwise

(4)

(3) (3) (3) (3) (3) (3) (3)

(3) = ( π1 , . . . , π

s , π

s+1,0 , π

s+1,1 , . . . , π

S−1,0 , π

S−1,1 , πS ) be the steadyLet Π state probability vector of P 3 .

(3) and Π

(3) e = 1 leads to

(3) P 3 = Π Simplifying the expressions Π (3)

π

i

=

pk (s−i) (1 − k (S−s) )(1 − k i ) (3) π

S for 1 ≤ j ≤ s, (r − p)(1 − k S ) (3)

π

S =

(1 − k S )(r − p) , r(1 − k s )(S − s) − ps(k s − k S )

p(1 − k s ) (2) (1 − k S−j ) πS for s + 1 ≤ j ≤ S − 1, (r − p)(1 − k S ) p¯ r (3) (2) (2) (2)

s+2,0 = · · · = π

S−1,0 = π

S , where k = π

s+1,0 = π p¯r

(3)

π

j,1 =

Stochastic Optimization of Local Purchase (3)

(3)

215

(3)

Theorem 4. The steady-state probability vector Π (3) = (π0 , π1 , π2 , . . . ) of P3 is given by ⎧ ⎪( q − p ) ⎨ π (3) for i = 0 (3) q πi = (5) q − p p i−1 (3) ⎪ ⎩( ) ρ π

for i ≥ 1 q p¯q p¯ q where ρ = . p¯q

5

Performance Measures (k)

(k)

(k)

Let Π (k) = (π0 , π1 , π2 , . . . ) for the model k = 1, 2, 3. Then the corresponding important system performance measures considered are give below. ∞ S

p¯ p . (q − p) ∞ S (k) ii) Expected inventory level, EIL = i=0 j=1 jπij . i) Expected queue length, EQ =

i=0

j=1

(k)

iπij =

iii) Expected rate of production, EP R, is EP R = r

s j=1

(k)

π

i +r

S i=s+1

(k)

π

i,1 =

(k)

(1 − (S − s)r πS ). ∞ (k) (k) iv) Expected local purchase rate, ELP = q(1 − r) i=1 πi = π

1 p(1 − r). ∞ q − p p i−1 (k) ) pq π

s+1,0 v) Expected production switching on rate, EON = q i=1 ( ¯ ρ q (k) = p πS .

6

Distribution of Number of Local Purchase in Specified Time

In order to calculate the probability duration of the number of customers being served in given time duration, first we truncate the size of the queue. For this, choose  > 0 and N large enough so that ∞ 

 ρi−1 < q − p p ) ( i=N +1 q p¯q On simplification, it reduces to ρN
0. The initial probability vector β = (β0 , β1 , β2 , . . . , βN ), where βi ’s are given by p p p 1− (1 − ) ρi−1 q q p¯q

where Π

= Π

(i) for Π, β0 = p N Π and for i ≥ 1, βi = p 1− ρ 1 − ρN q q i = 1, 2, 3 depending on the model.

Stochastic Optimization of Local Purchase

7 7.1

217

Numerical Experiments Cost Function

We define a suitable cost function on the basis of system performance measures. For this, we define individual cost c0 , c1 , c2 , c3 and c4 as c0 : switching cost for the production c1 : production per unit inventory per unit time c2 : holding of inventory per unit per unit time c3 : cost due to local purchase unit items c4 :cost per local purchase c5 :cancellation cost of a production process due to local purchase (c5 = 0 for model I and II) Define expected total cost (ET C) per unit time as ET C = c0 EON + c1 EP R + c2 EIL + (c3 Q + c4 + c5 )ELP where Q is the number of items locally purchased. 7.2

Graphical Illustrations

To determine the profitable model, the comparison of three models on the basis of the expected total cost is made. For this, first, fix all parameters and individual costs associated with the model except one. Then compare the cost associated with these models from the graph. Figure 1 illustrates the variation ETC with p corresponding to the other parameters in the figure. From this figure, when p = 0.34, ETC for all the three models are approximately the same. When p increases from there, ETC first decreases for these models. For 0.34 < p < 0.5, the Model 1 is the most profitable and Model 2 is profitable than Model 3. As p increases further, Model 2 is the most profitable and model 1 is more profitable than model 2. For p > 0.74 the model 3 is profitable than model 1. The greater ETC for Model 3 in the interval 0.34 ≤ p ≤ 0.74 is due to the cancellation cost c5 of the production associated with that model. If we increase c5 further, the Model 3 will be the least profitable model for all the values of p. Figure 2 illustrates the variation of ETC with r. For lower values of r, that is for r ≤ 0.5, model 2 is the best model and for r > 0.5, model 1 will be the suitable model. This indicates that when the replenishment rate is high, the minimum unit of local purchase makes the firm more profitable. Since all performance measures considered for cost function are independent of q, variations in q will not affect ETC. Figure 3 shows that for the other parameters mentioned in the figure, model II is the most profitable one and model I is profitable than model III. From all the figures, it is clear that the Model III is less acceptable compared to the model I and model II.

218

K.P. Jose and M.P. Anilkumar 180 Model I Model II Model III

170 160 150

ETC

140 130 120 110 100 90 80 0.3

0.35

0.4

0.45

0.5

0.55

0.6

0.65

0.7

0.75

0.8

p

Fig. 1. ETC vs. p. c0 = 250; c1 = 100; c2 = 5; c3 = 120; c4 = 200 : c5 = 600 : q = 0.9; r = 0.4; s = 8; S = 20 120 Model I Model II Model III

115

ETC

110

105

100

95

90 0.38

0.4

0.42

0.44

0.46

0.48

0.5

0.52

0.54

0.56

0.58

r

Fig. 2. ETC vs. r. c0 = 250; c1 = 100; c2 = 5; c3 = 120; c4 = 200 : c5 = 100 : q = 0.8; p = 0.6; s = 8; S = 20

Stochastic Optimization of Local Purchase

219

130 Model I Model II Model III

125

ETC

120

115

110

105

100 0.6

0.65

0.7

0.75

0.8

0.85

0.9

0.95

1

q

Fig. 3. ETC vs. q. c0 = 250; c1 = 100; c2 = 5; c3 = 120; c4 = 200 : r = 0.4; p = 0.6; s = 8; S = 20

Concluding Remarks This article analyzes a Geo/Geo/1 production inventory system with a local purchase during the stock-out period. We analyzed three models based on the number of items locally purchased. A closed-form solution is obtained for all these three models. Based on suitable cost function we compared the models by varying the parameters. The distribution of the number of times locally purchased during a specified period is also calculated. A simple extension of this model can be done by taking the variations in the local purchase quantity instead of these three cases. Further extensions are also possible by considering a discrete-time MAP for the arrival process or discrete-time phase-type distributions for service time and lead-time or both.

References 1. Alfa, A.S.: Applied Discrete-Time Queues. Springer, New York (2016). https:// doi.org/10.1007/978-1-4939-3420-1 2. Alfa, A.S.: Discrete time queues and matrix-analytic methods. Top 10(2), 147–185 (2002) 3. Anilkumar, M.P., Jose, K.P.: A Geo/Geo/1 inventory priority queue with self induced interruption. Int. J. Appl. Comput. Math. 6(4), 1–14 (2020). https:// doi.org/10.1007/s40819-020-00857-8 4. Berman, O., Kaplan, E.H., Shevishak, D.G.: Deterministic approximations for inventory management at service facilities. IIE Trans. 25(5), 98–104 (1993)

220

K.P. Jose and M.P. Anilkumar

5. Dafermos, S.C., Neuts, M.F.: A single server queue in discrete time. Technical report, Purdue University, Lafayette Indiana, Department of Statistics (1969) 6. Deepthi, C.: Discrete time inventory models with/without positive service time. Ph.D. thesis, Cochin University of Science and Technology (2013) 7. Krishnamoorthy, A., Jose, K.P.: Comparison of inventory systems with service, positive lead-time, loss, and retrial of customers. Int. J. Stoch. Anal. 2007, 1–23 (2008) 8. Krishnamoorthy, A., Lakshmy, B., Manikandan, R.: A survey on inventory models with positive service time. Opsearch 48(2), 153–169 (2011). https://doi.org/10. 1007/s12597-010-0032-z 9. Krishnamoorthy, A., Narayanan, V.C.: Production inventory with service time and vacation to the server. IMA J. Manage. Math. 22(1), 33–45 (2011) 10. Krishnamoorthy, A., Shajin, D., Narayanan, V.: Inventory with positive service time: a survey. In: Advanced Trends in Queueing Theory: Series of Books “Mathematics and Statistics”, Sciences. ISTE & Wiley, London (2019) 11. Krishnamoorthy, A., Varghese, R., Lakshmy, B.: An (s; Q) inventory system with positive lead time and service time under N-policy. Calcutta Stat. Assoc. Bull. 66(3–4), 241–260 (2014) 12. Krishnamoorthy, A., Viswanath, N.C.: Stochastic decomposition in production inventory with service time. Eur. J. Oper. Res. 228(2), 358–366 (2013) 13. Krishnamoorthy, A., Varghese, R., Lakshmy, B.: Production inventory system with positive service time under local purchase. In: Dudin, A., Nazarov, A., Moiseev, A. (eds.) ITMM 2019. CCIS, vol. 1109, pp. 243–256. Springer, Cham (2019). https:// doi.org/10.1007/978-3-030-33388-1 20 14. Lian, Z., Liu, L., Neuts, M.F.: A discrete-time model for common life time inventory systems. Math. Oper. Res. 30(3), 718–732 (2005) 15. Meisling, T.: Discrete-time queuing theory. Oper. Res. 6(1), 96–105 (1958) 16. Melikov, A., Molchanov, A.: Stock optimization in transportation/storage systems. Cybern. Syst. Anal. 28(3), 484–487 (1992) 17. Neuts, M.F.: Matrix-geometric solutions in stochastic models: an algorithmic approach. Courier Corporation (1994) 18. Saffari, M., Asmussen, S., Haji, R.: The M/M/1 queue with inventory, lost sale, and general lead times. Queueing Syst. 75(1), 65–77 (2013) 19. Saffari, M., Haji, R.: Queueing system with inventory for two-echelon supply chain. In: Proceedings of the 2009 International Conference on Computers and Industrial Engineering, pp. 835–838. IEEE (2009) 20. Schwarz, M., Daduna, H.: Queueing systems with inventory management with random lead times and with backordering. Math. Methods Oper. Res. 64(3), 383– 414 (2006) 21. Schwarz, M., Sauer, C., Daduna, H., Kulik, R., Szekli, R.: M/M/1 Queueing systems with inventory. Queueing Syst. 54(1), 55–78 (2006) 22. Schwarz, M., Wichelhaus, C., Daduna, H.: Product form models for queueing networks with an inventory. Stoch. Models 23(4), 627–663 (2007) 23. Sigman, K., Simchi-Levi, D.: Light traffic heuristic for an M/G/1 queue with limited inventory. Ann. Oper. Res. 40(1), 371–380 (1992)

Mathematical Model of Horizontal VNF Scalability in virtualized Evolved Packet Core Alexey Tsarev(B)

and Pavel Abaev

Peoples’ Friendship University of Russia (RUDN University), 6 Miklukho-Maklaya Street, Moscow 117198, Russian Federation [email protected], abaev [email protected] http://www.rudn.ru

Abstract. Next generation networks such as 5G provide a new approach for building highly scalable network infrastructure owing to NFV/VNF and SDN technologies. Infrastructure scalability allows a network operator to offer fine-graded on-demand services deployment. We consider virtualized Evolved Packet Core which functions are represented in form of several Virtual Network Functions. Computational capacity of every function could be extended via scaling mechanism with noninstantaneous activation/deactivation. In this paper we build a mathematical model of horizontal scaling for vEPC function in terms of queuing model with finite buffer size, several group of servers and queue thresholds. As a result, analytical formulas were derived and QoS metrics were proposed. Analytical evaluation shows that correct thresholds selection allows to significantly improve system performance. Keywords: Virtualized EPC · Evolved packet core · Queuing model Horizontal scalability · Non-instantaneous activation/deactivation · VNF · SDN · 5G

1

·

Introduction

Rapid development and evolution of modern computer networks is a network operator’s response to increasing data consumption [1]. Cisco analytics predicted that two-thirds of humanity will have access to the Internet by 2023, and, consequently, generate data traffic. Further, the number of mobile users will reach 5.7 billion and the number of mobile connections will reach 13.1 billion [2]. Beyond that, one should take into the account increased user mobility and network traffic heterogeneity that implies different QoS/QoE requirements. In order to cope with the mentioned challenges, telecommunication operators need properly update network infrastructure. One of the emerging trends in next The publication has been prepared with the support of “RUDN University Program 5-100” program. c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 221–234, 2020. https://doi.org/10.1007/978-3-030-66242-4_18

222

A. Tsarev and P. Abaev

generation networks became 5G technology standardized by ITU. According to forecasts, more than 50 operators from 38 countries plan to launch 5G between 2018 and 2023 [3]. Since 5G includes concepts such as Software Defined Networking and Network Functions Virtualization [4], telecommunication operators could build more flexible and scalable infrastructure. The transition of Evolved Packet Core to the virtual one with help of Virtual Network Functions allows to increase the use of network resources and reduce OPEX [5]. At the same time one of key features of virtualization is possibility of resource scaling. What is more, the network load by user data usually has peaks during the day [6]. Therefore, one of the optimal strategies for mobile operators could be resource scaling in order to cope the bottlenecks. One of approaches for modelling scale in/out process and overcoming either overloads or resource allocation issues alongside with the hysteresis technique successfully used in [7–10,17–19] could be non-instantaneous activation and deactivation of additional resources studied in this work. The rest of the paper is organized as follows. Section 2 provides a brief overview of scalability researches for virtualized EPC and SDN. Section 3 describes a system model and approach for scale in/out process. Section 4 deals with a mathematical model in terms of queueing model with finite buffer, finite servers number and queue thresholds. Section 5 provides results of analytical evaluation. Section 6 contains conclusions.

2

Background

Every new standard of next generation networks forces the network owner to update mobile core network, especially Evolved Packet Core, due to the tightening requirements for Quality of Service and Quality of Experience. The emergence of some modern technologies, such as cloud computing, network virtualization and software-defined networking changed traditional approaches for building and updating network. In particular, network core virtualization allows to replace expensive proprietary equipment with similar not so expensive ones with an open architecture. Moreover, in such case Evolved Packet Core as well as network control plan could be moved to the cloud. This fact allows to use benefits of scalability. In the literature researchers focus on different aspects of virtual EPC scalability. Abaev et al. study in [9] case of hybrid evolved packet core with assumption there are legacy and virtualized parts of EPC. The system has two thresholds: one for scaling in and another for scaling out. Once scaling process initiated, VNF orchestrator deploys new VNF consecutively one by one. Proposed model is analyzed in a custom simulator. Tobar et al. develop in [10] a scaling mechanism for evolved packet core based on network functions virtualization taking into the account both horizontal and vertical scalability. Proposed framework allows to find optimal workload between horizontal and vertical scaling and avoid waste of resources. Also, extensive

Mathematical Model of Horizontal VNF Scalability in vEPC

223

scalability evaluation was performed in AWS on the base of vEPC from Indian Institute of Technology Bombay. Liebsch et al. propose in [11] extension for traditional VNF scaling. The main idea of developed approach consists in scaling VNF from vEPC Data Plane that allows to avoid failure of overloaded Data Plane functions. In order to validate the proposal, the authors perform testing in real environment. Evaluated results demonstrate efficiency of runtime offload. Kempf et al. consider in [12] the possibility to move EPC to the cloud. The main contribution of this work consists in describing how SDN could be applied Evolved Packet Core. The authors describe enhancements for Open Flow protocol and Open Flow switches necessary for EPC virtualization. Neither analytical nor numerical evaluation carried out. Arteaga et al. investigate in [13] adaptive scaling mechanism in application to NFV-based EPC. The authors propose adaptive scaling algorithm based on Q-Learning and Gaussian Processes. Simulation shows better accuracy then algorithms with static thresholds. Khakimov et al. focuse in [14] on IoT topic and propose Fog based structure of the network in SDN enabled environment. The authors describe IoT-Fog based structure and introduce data offloading algorithm that consists in scaling of socalled Fog machines in case of resources allocation. Experimental evaluation of the proposed framework shows efficiency of dynamic Fog nodes deployment. Muthanna et al. study in [15] multi-controller SDN networks. The authors consider SDN controllers hierarchy consisting of two levels: single main controller and a set of distributed child controllers. According to considered framework master controller is responsible for distributed controllers clustering. Load balancing algorithm with dynamic clustering of child controllers is proposed and evaluated. Dynamic clustering using described algorithm achieves higher efficiency then existing static ones. Muthanna et al. provide in [16] a framework that integrates at the same time such concepts as IoT, Fog computing, SDN and blockchain. The first layer of the proposed architecture consists of IoT devices and sensors, the second layer consists of dynamically deployed Fog nodes and the last layer represents remote cloud. SDN is used for control and management of Fog nodes. In order to provide high-security level to the proposed Iot network blockchain is used for SDN and Fog nodes connection. The authors propose data offloading algorithm and analytical traffic model. Overall, all the mentioned papers have no analytical results. Alternatively, if we ignore SDN/VNF topic we can find interesting analytical works regarding either search of optimal hysteresis strategy in multi-server system [17] and analysis of multi-server threshold systems with hysteresis in [18,19]. Kim et al. consider in [17] the problem of building optimal strategy for hysteresis control in multi-server queuing system. The authors show a complexity of dynamic resources optimization and highlight differences between hysteresis strategy and threshold strategy. As a main result the authors provide a framework for performance evaluation of MMAP/PN/N queuing system with hystere-

224

A. Tsarev and P. Abaev

sis control. Numerical evaluation realized by the authors demonstrates efficiency of hysteresis strategy. Lui and Golubchik consider in [18] three variants of multi-server queuing systems with thresholds. The first considered system has homogeneous servers with Poisson input flow, the other system has heterogeneous servers with Poisson input flow and the last one has homogeneous servers with bulk Poisson input flow. The authors obtain closed-form analytical solution for homogeneous case under assumption there are no restrictions on the servers number or requests waiting time. Moreover, the algorithmic solution for variations problem was proposed for the system with heterogeneous servers and bulk arrivals under the same assumptions. In order to validate derived formulas and check system performance the authors realize analytical evaluation using the systems response time as a performance indicator. Chou et al. study in [19] multi-server system with limited resources with heterogeneous workload classes and non-instantaneous servers activation. The achieve clarify that it is important not only achieve the best performance, but also appropriate cost/performance ratio. The authors provide iterative approximation method for solving considered set of models. As a conclusion, the authors provides numerical validations in order to prove the accuracy of the proposed methods, demonstrate the impact of the servers activation rate and highlight the benefits of the resources sharing among heterogeneous classes of the workload. In this paper we study VNF deployment of virtual EPC function that supports horizontal resources scaling and we propose analytical model for mentioned VNF deployment in form of multi-server queuing model with thresholds and noninstantaneous activation and deactivation.

3

System Model

Evolved Packet Core is an important element of any modern network. Furthermore, EPC is responsible for authentication, authorization, channel bandwidth calculation, user mobility processing, etc. The main functions of the EPC include Access and Mobility Management Function (AMF), Session Management Function (SMF), User Plane Function (UPF), Unified Data Management (UDM) and Policy Control Function (PCF). SDN support in 5G networks allows network operators to virtualize mentioned functions via software and hardware decoupling. In the literature can be found different approaches of Evolved Packet Core virtualization. For instance, in [20] are described three main approaches of Evolved Packet Core architecture virtualization, all the others ways can be considered as a mix of the presented ones. The first EPC architecture is based only on the virtualization with NFV concept. In such implementation all the functions of the EPC are implemented as software running in some virtual machine/cloud container. Multitenancy concept could be considered for this implementation since multiple vEPC could be deployed simultaneously. However, there are challenges at adding new VNF to

Mathematical Model of Horizontal VNF Scalability in vEPC

225

vEPC since they should be correctly configured as well as deployed in a coherent way. Also, scaling could be not so efficient due to different resource requirements for data and control plane at the gateway. The other virtual EPC implementation includes a branch of architectures based on SDN and NFV concepts. Here SDN-controller is used as a bridge between control and data planes. Since control plane is decoupled from data plane, thus they be scaled independently. This virtualization approach also is a key driver for mobile edge computing since virtualized EPC functions could be deployed over the network in the closest way to the users. Despite the benefits of mentioned approach, SDN-controller scalability issue remains one of the main challenges. The last one approach of EPC virtualization consists in using of only SDN concept. In this case all the network elements are replaced with simple data forwarding elements and network functions of EPC are replaced with special software installed at SDN-controller. The main advantage of clear SDN EPC architecture are high flexibility and full programmability as well as flat network structure. As a drawback the following issues could be considered: control plan complexity that affects QoS and the fact that described approach is not compatible with present working EPC.

NFV Orchestrator

VNF:UDM UDM VNF: VNF: UDM

N8

N10 VNF:PCF PCF VNF: VNF: PCF

N15

vAMF vAMF VNF: AMF

N7 VNF:SMF SMF VNF: VNF: SMF

N11

N4 VNF:UPF UPF VNF: VNF: UPF

N3 NG-RAN

N2 Legend Not-virtualized EPC function

Virtualized EPC function VNF Control link

5G Interface

N1

Fig. 1. Virtualized EPC architecture

226

A. Tsarev and P. Abaev

In scope of this work we consider virtual EPC implemented according to the second approach using SDN and NFV due to the following reasons: a) this approach is applicable to the majority of the existing core networks and b) unlike the purelly NFV approach there is no problems with VNF scalability witin deploed virtual EPC. EPC virtualization involves the transformation of EPC functions into Virtual Network Function (VNF), whose lifecycle is managed using VNF Manager. The decision whether to deploy a new function or disable the old one is realized by NFV Orchestrator. Thus, if a bottleneck occurs at the level of any of the EPC functions, network functions management and orchestration will allow to react to the situation promptly and provide additional computing power to the problem node. An example of a virtualized EPC architecture is shown in the Fig. 1. We consider a VNF function of a certain type. The minimum number of available rsources is enough for the normal functioning of the network, we denote this group as c0 . When the bottleneck occurs, it is feasible to allocate additional computational resources to the VNF in order to provide required QoS level, particularly for delay critical applications. Since new resources deployment is not instant and requires some time, it is worthwhile to use batch deploy approach. We consider the same assumption for undeployment procedure. We consider reaching the threshold Hi in the queue of waiting requests as a trigger for the resources group ci , 1 ≤ i < k deploy.

4

Mathematical Model

The model is represented by the finite buffer of capacity r and C servers, as shown in the Fig. 2.

1 ...

Group 0

C

1 Group k

...

H k ... H1

c0

...

r

0

k

ck

Fig. 2. Queuing model

The Poisson requests flow reaches the system with rate λ, 0 < λ < ∞ . We consider FCFS behavior for all incoming requests. Any server accepts one request

Mathematical Model of Horizontal VNF Scalability in vEPC

227

at a time. All the servers are divided into k + 1 groups with exponentially distributed service rate μi , 0 < μi < ∞, 0 ≤ i ≤ k + 1. The system’s buffer has a set of thresholds H = Hi , 0 < Hi < r, 1 ≤ r ≤ k. Threshold Hi correlates to server group i. Initially, only servers from group 0 handle incoming requests. As soon as the buffer size reaches the threshold Hi , all the servers from group i become available for requests handling after scale in procedure that follows exponential distribution with rate θ, 0 < θ < ∞; and vice versa in case buffer size drops below the threshold Hi , all the servers from group i become unavailable after scale out procedure that follows exponential distribution with rate γ, 0 < γ < ∞. Let us use the following assumption: during activation or deactivation of a servers group the number of requests in the buffer cannot change. Another assumption is that the server, that provides service to a request, can not be changed if requests servicing is in process. Assume X(t) = (n(t), m(t)) is a two-dimensional Poisson process over the set of states χ(t) = (n, m) : (0 ≤ n ≤ r, 0 ≤ m ≤ k) where n defines the number of requests in the system and m defines the number of working server groups. It is evident X(t) is ergodic and its stationary distribution exists. Let us denote p(i, j) = limt→∞ P {n(t) = i, m(t) = j} as stationary distribution. Transition rate graph for described system is presented in the Fig. 3. Assume g(m) as a set of states for group m taking into the account the following assumption: H0 = 0 and Hk+1 = r: g(m) = {(Hm , m), ..., (Hm+1 , m)}, 0 ≤ m ≤ k

(1)

Note, that: k 



p(i, j) = 1

(2)

m=0 (i,j)∈g(m)

Consider for brevity μ(n, m) as serving rate for n requests in the system and m deployed server groups: μ(n, 0) = min(n, c0 ) · μ0 m−1 m−1 μ(n, m) = j=0 cj · μj + min(n − u=0 cu , ck ) · μk , m > 0

(3)

For case m = 0 stationary distribution could be expressed as: λn · p(0, 0), 1 ≤ n ≤ H1 i=1 μ(i, 0)

p(n, 0) = n

(4)

Note, that partial balance equations exist for neighboring groups: p(n, m) =

θ · p(n, m − 1), 1 ≤ m ≤ k, n = Hm γ

(5)

Taking into the consideration (5), for case m = 1 we obtain: p(n, 1) =

n−H λH1 θ n−H1  1 · p(0, 0), H1 ≤ n < H2 ·λ μ(i, 1) · H1 γ i=1 μ(i, 0) i=1

(6)

228

A. Tsarev and P. Abaev

Fig. 3. Transition rate graph

Correspondingly, in general case we have:  m  m θ p(n, m) = λ · · γ v=0 n

 (i,j)∈g(v)

1 · p(0, 0) μ(i, j)

(7)

Mathematical Model of Horizontal VNF Scalability in vEPC

229

Since all p(n, m) are expressed through p(0, 0) we have: p(n, m) = q(n, m) · p(0, 0)

(8)

Hence, from (2), (7) and (8) we obtain p(0, 0): p(0, 0) = m  v=0

1

(n,m)∈g(v)

q(n, m)

(9)

Thus, stationary distribution could be calculated analytically using (8) and (9). Main performance metrics could be calculated by the formulas (10), (11), (12), (13) and (14). Let B denote the blocking probability: B = p(r, k)

(10)

Let Q denote mean queue size: ⎛ ⎞ k m    ⎝n − min(n, Q= cj )⎠ · p(n, m) v=0 (n,m)∈g(v)

(11)

j=0

Let N denote mean number of requests in the system: N=

k 



n · p(n, m)

(12)

v=0 (n,m)∈g(v)

According to Little’s Law, let WQ denote mean time that a request spends in the queue and WN denote mean time that a request spends in the system:

5

WQ =

Q λ · (1 − B)

(13)

WN =

N λ · (1 − B)

(14)

Analytical Evaluation

We provide analytical evaluation applied to four difference scenarios. Input values for evaluation are provided in Table 1. We consider that μ−1 equals 1 as a time unit. Server groups number equals 3 and includes zero group, hence we have only 2 thresholds.

230

A. Tsarev and P. Abaev Table 1. Considered input for evaluation

5.1

Parameter Comment

Value

λ

Incoming requests rate

1–20

Q

Queue length

50

θ

Servers group deployment rate

0.005

γ

Servers group undeployment rate 0.00005

c0

Group 0 servers count

10

c1

Group 1–2 servers count

5

μ0

Service rate in group 0–2

1

H1

Threshold for group 1

12

H2

Threshold for group 2

25

Varying Queuing Size

In this scenario we investigate the influence of buffer size on the system performance. Evaluation demonstrates that buffer capacity growth leads to packet

Fig. 4. Probability to block incoming request

Mathematical Model of Horizontal VNF Scalability in vEPC

231

loss reduction illustrated on the Fig. 4(a) and mean queue size rise illustrated on the Fig. 5(a). Although, there is no effect of added thresholds control on the blocking probability, anyway we can see serious benefit in terms of mean waiting time and slight impact on queue size. 5.2

Varying the Biggest Group Number

In this scenario we analyze resource allocation among fixed number of server groups. Figure 4(b) shows that there is no difference in terms of blocking probability for different group setups. However, it is worth noting that allocating more resources to the last servers group improves QoS: mean queue size drastically falls on the Fig. 5(b) as well as mean waiting time on the Fig. 6(b). 5.3

Varying Groups Count

In this scenario we study optimal number of groups for case of equal resource allocation. We consider 2 groups of 10 servers, 3 groups of 6 and 7 servers and,

Fig. 5. Mean length of system’s queue

232

A. Tsarev and P. Abaev

Fig. 6. Mean serve waiting time

finally, 4 groups of 5 servers. Numerical evaluation clearly demonstrates on the Fig. 4(c) that small number of groups with more resources is better in terms of blocking probability than large number of groups with fewer resources. Despite the fact that 2 groups of 10 servers shows higher mean queue size on the Fig. 5(c) and waiting time on the Fig. 6(c) at low values of λ, with growth of λ this setup achieves better performance. 5.4

Varying Group Service Rate

In the last scenario we evaluate impact of different service rates on the system. We use μ = 1 for all the groups as a reference result.Fig. 4(d) demonstrates that service rate boost by 10%, 20% and 30% considerable decreases blocking probability. Nevertheless, Fig. 5(d) and Fig. 6(d) show slightly decline for mean queue size and waiting time.

Mathematical Model of Horizontal VNF Scalability in vEPC

6

233

Conclusions

In this paper we give an overview of virtualized Evolved Packet Core which throughput could be extended by allocation of additional computational resources in result of scaling in procedure. The thresholds control approach was applied in order to handle horizontal scaling of VNF. Mathematical model in terms of queuing theory was proposed and analytically evaluated. It was shown that horizontal resource scaling could significantly improve the system performance. The following topics could be covered during further researches. First, in order to find optimal server groups partition and thresholds position optimization problem should be formulated and solved. Second, computation issues could appear for high values of r parameter. Third, more realistic approximation of input flow and activation/deactivation mechanism could be used that implies mathematical model sophistication and, correspondingly, results refinement.

7

Appendix

This paper is an extension of work originally presented in 23rd International Conference on Distributed Computer and Communication Networks: Control, Computation, Communications (DCCN 2020).

References 1. Soliman, S., Song, B.: Fifth generation (5G) cellular and the network for tomorrow: cognitive and cooperative approach for energy savings. J. Netw. Comput. Appl. 85, 84–93 (2017) 2. Cisco annual internet report (2018–2023). White Paper (2020) 3. Global progress to 5G - trials, deployments and launches. GSA Report (2018) 4. Agiwal, M., Roy, A., Saxena, N.: Next generation 5G wireless networks: a comprehensive survey. IEEE Commun. Surv. Tutorials 18(3), 1617–1655 (2016) 5. Economic benefits of virtualized evolved packet core. White Paper, IDC (2016) 6. Abaev, P., Razumchik, R., Uglov, U.: Statistical analysis and modeling of SIP traffic for parameter estimation of server hysteretic overload control. J. Telecommun. Inf. Technol. 4, 22–31 (2013) 7. Abaev, P., Gaidamaka, Y., Samouylov, K., Pechinkin, A., Razumchik, R., Shorgin, S.: Hysteretic control technique for overload problem solution in network of SIP servers. Comput. Inf. 33, 218–236 (2014) 8. Abaev, P., Gaidamaka, Y., Samouylov, K.E.: Modeling of hysteretic signaling load control in next generation networks. In: Andreev, S., Balandin, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART -2012. LNCS, vol. 7469, pp. 440–452. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-32686-8 41 9. Abaev, P., Tsarev, A.: Hysteretic mechanism for 5G hybrid evolved packet core resource management. In: Proceedings of the 10th International Congress on UltraModern Telecommunications and Control Systems and Workshops (ICUMT), pp. 1–6 (2018). https://doi.org/10.1109/ICUMT.2018.8631209

234

A. Tsarev and P. Abaev

10. Tobar Arteaga, C.H., Anacona, F.B., Tobar Ortega, K.T., Caicedo Rendon, O.M.: A scaling mechanism for an evolved packet core based on network functions virtualization. IEEE Trans. Netw. Serv. Manage. 17, 1–14 (2019). https://doi.org/10. 1109/TNSM.2019.2961988 11. Liebsch, M., Faqir, F.: Virtualized EPC - runtime offload for fast data-plane scaling. In: Proceedings of the IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), pp. 1–6 (2016). https://doi.org/10.1109/ PIMRC.2016.7794939 12. Kempf, J., Johansson, B., Petterson, S., Luening H., Nilsson, T.: Moving the mobile evolved packet core to the cloud. In: Proceedings of the 8th International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 784–791 (2012). https://doi.org/10.1109/WiMOB.2012.6379165 13. Tobar, C., Risso, F., Caicedo, O.: An adaptive scaling mechanism for managing performance variations in network functions virtualization: a case study in an NFVbased EPC. In: Proceedings of the International Conference on Network and Service Management (CNSM), pp. 1–7 (2017). https://doi.org/10.23919/CNSM.2017. 8255982 14. Khakimov, A., Gudkova, I., Ateya, A.A., Markova, E., Muthanna, A., Koucheryavy, A.: IoT-Fog based system structure with SDN enabled. In: ACM International Conference Proceeding Series, Article No. 62 (2018). https://doi. org/10.1145/3231053.3231129 15. Muthanna, A., et al.: SDN multi-controller networks with load balanced. In: ACM International Conference Proceeding Series, Article No. 57 (2018). https://doi.org/ 10.1145/3231053.3231124 16. Muthanna, A., et al.: Secure and reliable IoT networks using fog computing with software-defined networking and blockchain. J. Sens. Actuator Netw. 8(1), 15 (2019). https://doi.org/10.3390/jsan8010015. Article No. 8010015 17. Kim, C.S., Dudin, A., Dudin, S., Dudina, O.: Hysteresis control by the number of active servers in queueing system with priority service. Perform. Eval. 101, 20–33 (2016). https://doi.org/10.1016/j.peva.2016.04.002 18. Lui, J., Golubchik, L.: Stochastic complement analysis of multi-server threshold queues with hysteresis. Perform. Eval. 35(1–2), 19–48 (1999). https://doi.org/10. 1016/S0166-5316(98)00043-1 19. Chou, C., Golubchik, L., Lui, J.: Multiclass multiserver threshold-based systems: a study of noninstantaneous server activation. IEEE Trans. Parallel Distrib. Syst. 18(1), 96–110 (2007). https://doi.org/10.1109/TPDS.2007.253284 20. Nguyen, V., Brunstrom, A., Grinnemo, K., Taheri, D.: SDN/NFV-based mobile packet core network architectures: a survey. IEEE Commun. Surv. Tutorials 19(3), 1567–1602 (2017). https://doi.org/10.1109/comst.2017.2690823IEEE

The Method for User Localization in the Local Wireless Network in an Emergency A. I. Paramonov1,2(B) , T. M. Tatarnikova3 , and R. V. Shamilova4 1

The Bonch-Bruevich Saint-Petersburg State University of Telecommunications, Bolshevikov, 22, Saint-Petersburg, Russia [email protected] 2 RUDN University, Miklukho-Maklaya str.6, Moscow, Russia 3 Russian State Hydrometeorological University, Voronezhskaya ulitsa, 79, Saint-Petersburg, Russia 4 ITMO University, Kronverkskiy pr., 49, Saint-Petersburg, Russia

Abstract. The paper provides an analysis of the use of a number of capabilities of local wireless broadband access networks in the management of rescue people in emergency situations. The article discusses such basic features as localization of users and increasing the availability of information for people who find themselves in dangerous conditions and for the rescue control center. Possible localization methods are considered and an original method is proposed that allows localization to be performed elementwise, i.e. in rooms or in certain areas of the service area. Keywords: Wireless local area network · Broadband access network Localization · Coordinate determination · Local area network

1

·

Introduction

Wireless Broadband Access Networks (WLANs) are now widely distributed around the world. In particular, for example, technologies based on the IEEE 802.11 family of standards [1] are used to build networks of various sizes: private networks (PAN - Private Area Network) within private residential premises, device-to-device connections (D2D - Device-to-Device) between mobile terminals or other devices, corporate networks (WLANs - wireless local area networks) of various organizations, public WLANs, both indoors and outdoors. To date, the number of networks built using these technologies is so large that almost anywhere in the city territory can receive signals from several access points of various networks [2–6] WLAN. In promising mobile networks, WLANs also play an important role, according to which they become an integral part of these networks [7]. WLAN networks are just a tool that potentially allows you to receive information about people (coordinates, dialogue), the state of the environment, the Supported by RUDN University. c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 235–246, 2020. https://doi.org/10.1007/978-3-030-66242-4_19

236

A. I. Paramonov et al.

transfer of information to coordinate actions in case of emergencies. In this paper, we consider only the possibility of using WLAN in the tasks of localizing users of devices connected to the network. We will also assume that a person in the emergency zone may have a subscriber terminal that supports the protocols of this group of standards. We believe that if such a terminal exists, then it is with the user. The user localization function can be implemented by means of a WLAN (controller) or external application software installed on an external server relative to the WLAN equipment. In principle, the localization task is similar to the positioning task. There are many works devoted to positioning problems. As a rule, the positioning problem is considered as the problem of determining the coordinates of an object in space. This problem can be viewed both in 3D space and on a plane. This work also deals with determining the position of an object, but its purpose is not to obtain numerical estimates of coordinates. The purpose of localization is to determine whether the coordinate of an object belongs to a particular area in the network service area. Despite the fundamental similarity of these tasks, the solution to the localization problem may differ from the positioning problem. In real wireless access networks, various ways of implementing this function are possible, they depend on the specific network and the manufacturer of the WLAN equipment, configuration, software and controller settings. In this paper, we propose a localization method that can be implemented both as part of the controller software and on equipment external to the network, provided that there is access to the necessary information. In many WLAN implementations, such functions are not provided at all, however, the potential capabilities of user terminals (smartphones) make it possible to implement it in the form of application software installed on terminals and some server equipment. In this paper, the purpose of localization will mean determining the location of clients, i.e. people in the room in question. The result of solving such a problem is information about the element of the room where people are. In what follows, we will understand a room element as a certain part of it (room, corridor, hall, etc.) or the conditional border of such an element, introduced when forming the floor plan. Thus, the result of the functioning of such a system is information about the elements of the room in which people are. Of course, to solve this problem, the functioning of the WLAN or part of it, as well as the client equipment, is necessary. Let us consider further the options for implementing the localization system, depending on the technical capabilities of the WLAN used.

2

Implementation Options

As noted in the introduction, the functions under consideration can be implemented in two ways: by means of WLAN, i.e. using the means of the WLAN controller, and using additional means, i.e. software developed for user terminals and server hardware. Let’s consider the first way. The ability to implement

The Method for User Localization in the Local Wireless Network

237

localization functions by means of WLAN assumes the presence of a WLAN controller, the corresponding software installed on the controller or on an additional server that interacts with the controller, as shown in Fig. 1.

Fig. 1. Service organization structure by means of WLAN

In this case, the WLAN controller allows either to implement the localization functions in whole or in part, and also allows access to the data necessary for solving the localization problem from the server side, on which specialized software is installed. The software is controlled by the administrator of the service that solves the problem under consideration. In general, the server can communicate with the controller via a communication network, i.e. be at a considerable distance from the WLAN. It can also be part of an overall system deployed to serve multiple WLANs. Possible implementation options depend on specific applications. The server, possibly in conjunction with the WLAN controller, provides basic localization functions, and also provides access to localization results from

238

A. I. Paramonov et al.

external clients, which can be various services, for example, building administrators, security services, rescue teams or other services. The advantages of this structure are that clients for which the localization task (MS) is performed can be any clients that have devices turned on and connected to the WLAN. It should be noted that a WLAN connection is a prerequisite. Otherwise, the network will have no information. When implementing this method, software is required to be installed on the server and, possibly, a WLAN controller, depending on the implementation specifics. The task of the software is to obtain data on the level of reception of client signals by network access points, as well as to solve the localization problem based on the received data. The disadvantage of this method is that the WLAN controller must provide the necessary data (data on the levels of signals received by the access points). In practice, not all existing equipment can do this. Usually, the technical features of building a WLAN are determined by proprietary software, which does not give open access to data, but only performs certain functions for managing the WLAN. This is probably the greatest difficulty and obstacle in the implementation of this structure. Second way. In this case, the WLAN controller is not used in solving the localization problem. The general structure of the tools needed to implement localization in this way is shown in Fig. 2. There is no WLAN controller in this diagram, although it physically exists, it only performs network management functions. The main elements of the system in this case are the server and client terminals connected to the WLAN. Specialized software is installed on these elements. A special application must be installed on each of the client terminals, which interacts with the server software in solving the localization problem. The client application must be active and have the necessary access rights to the elements of the smartphone or tablet computer. Its task is to assess the levels of received signals from WLAN access points and send this data to the server. Server software based on received from clients solves the problem of localization. Of course, the client application may have other functions that are of interest both in this task and in other tasks, which may differ in each specific case. The advantage of this method is independence from the specific technical implementation of the WLAN. To implement it, you only need a server, appropriate software and client software. From the point of view of technical implementation, this method may be the simplest. The disadvantage of this method is that the client software needs to be installed and properly functioning. This is a significant drawback that can become an obstacle to the implementation of such a system in public places. The administrator of this system must be able to influence the behavior of clients in such a way that they independently install client applications. It is probably possible to implement this in corporate networks, where customers are employees, visitors or other persons with a certain interest in following the rules.

The Method for User Localization in the Local Wireless Network

239

Fig. 2. Service organization structure by additional means

As can be seen from the description, these options are similar to the localization method, namely, the measurement of the received signal power level is used to determine the position. In the first method, measurements are taken by the access points. The levels of the signal received from client devices are measured. The measurement results are transmitted to the server, processed and used to solve the localization problem. In the second method, measurements are taken by client devices running a special client application. This evaluates the signal power levels of the access points. The results are sent by each client terminal to the localization server. The server processes the received data and solves the localization problem. The results of solving the localization problem are available to users, who can be people, automatic devices or control systems that have access to them. Probably, if there is a technical feasibility, the first option is preferable because it is possible to work with any clients without the need to install client software. However, in the absence of technical feasibility, the second implementation option in a number of cases makes it possible to increase the efficiency of solving localization problems.

240

A. I. Paramonov et al.

It should also be noted that, despite the noted advantages of the first method, an error may occur associated with the passive state of client devices, which, in order to save energy, go into “sleep” mode. In this mode, the access points do not receive signals from them, so the data that the system has may become outdated. In this sense, the second method has certain advantages, since the client application can activate the device at the required intervals. Summarizing the above, we can conclude that a combined system using WLAN functionality and specialized client applications may have the best properties.

3

Model

We assume that a WLAN consists of many n APs, a controller, an application server, and additional tools located on the target. As noted above, the presence of a controller in the simulation is taken into account only when considering the first embodiment of the system. It is also worth noting that its functioning is reduced in this model only to providing access to data on the signal levels received by the access points. Therefore, when modeling a localization system, its presence or absence does not matter. As the target object, we will consider the interior space of a certain room, Fig. 3. For this, we will consider a model of a building in which WLAN access points are located on the internal elements of the premises, the internal rooms are separated by walls and floors, similarly, auxiliary elements of the system can be placed. MS network users can be anywhere in the building. We use the approach implemented by classification methods [8]. We divide the room in question into some units of area or volume (slices) and number them q = 1, ..., S. The unit may be, for example, a room, square or cube of a certain size. The choice of units depends on the characteristics of the room and the convenience of their localization. Due to the fact that the WLAN located in the room has fairly stable parameters, there is reason to believe that when the terminal is placed at the same point multiple times, the signal level received by different access points will be quite close at each attempt. This problem can be considered as the task of assigning an unknown element to one of the known classes - slices. In the classification problem, each of the slices represents a class, and the measured signal level by the access point is a discriminant variable. Based on the values of the discriminant variables, a decision is made on whether the observed object belongs to one or another class. Suppose that, as a result of preliminary experiments on measuring the signal level (training) generated by the terminal at a set of m slice points q, the level value is obtained, j = 1, ..., n; r = 1, ..., m. Each of m points is characterized by a vector of n elements u (r ) = {u1 , u2 , ..., un }, r = 1, ..., m that correspond to signal levels u (r ) received by n access points, i.e. has n coordinates. For each slice i, the center of mass is calculated, which is a point in n - dimensional space whose coordinates are defined as (1).

The Method for User Localization in the Local Wireless Network

241

Fig. 3. Placement of access points, auxiliary equipment and users in the premises

1  (r) u j = 1, ..., n m r=1 j m

μq = {μ1 , μ2 , ..., μn }, q = 1, ...S, where μj =

(1)

Figure 4 is an example of conditional division of the served area into slices. To localize the subscriber terminal x, it is necessary to determine its proximity to the centers of mass of each of the slices defined at the stage of system training. We estimate the degree of proximity by calculating the Mahalanobis distance [9] given by (2).  (2) Mq (x) = (x − μq )T S −1 (x − μq ) where S −1 is the covariance matrix x and μ. Calculating (2) for each slice, we obtain the distance vector M of size S. The most probable localization is determined by the minimum value search operation. qmin = arg qmin{M}

(3)

The result of (3) is a single slice number, however, in a real situation it may turn out that several estimates (3) have close values. Therefore, it is advisable to introduce some empirical quantity η, taking into account the localization error. Then the solution to the problem will be a set of slice numbers for which the Mahalonobis distance between the center of mass and point x does not exceed qmin{M + η}. Q = {q|(Mq ≤ qmin[M + η], q = 1, ..., S)}

(4)

242

A. I. Paramonov et al.

Fig. 4. An example of representing a service area as slices

The last expression is of great practical importance, because it allows you to define a set of slices in the practical situation of rooms where people are most likely to be (subscriber terminal). Along with expression (5), one can use the approach using the assumption of the distribution of M, which, in the case of the normal distribution of x, has a Hotelling distribution T 2 [9].   n 1 , (m − n + 1) (5) F (M ) = I M (m−n+1) M (m−n+1) 2 2 m( +m−n+1) m where I is the regularized incomplete beta function, n is the dimension, m is the scale factor. Then the expression for the solution will have the form QH = {q|(Mq ≤ arg[F (M0 ) ≤ P0 ])}

(6)

where P0 is the specified probability that the Mahalonobis distance does not exceed M0 . It should be noted the obvious sensitivity of this method to the failure of access points. The previously expressed expression (2) is calculated based on the data of all access points n, therefore, when solving the localization problem (4), (5) it is also required to have data from all n access points. In case of failure of some access points, i.e. the absence of part of the initial data, the solution may have a significant error.

The Method for User Localization in the Local Wireless Network

243

In order to reduce this error, it is advisable to store the source data, on the basis of which expressions (2) are calculated, and if some access points fail, recount (2) taking into account the data of only functioning equipment. The advantages of this method include the fact that it is invariant to units of measurement (power level) and does not require calibration of access points, which greatly simplifies its implementation. The localization method can be represented by the following algorithm, Fig. 5. The training stage, a lot of measurements of the signal level are made at various points of various slices. For these measurements, the average values μq = {μ1 , μ2 , ..., μn }, q = 1, ...S are calculated according to (1). The measurement cycle continues until the probability of a localization determination error exceeds a preset value of Po or until its value ceases to decrease with an increase in the number of measurements. Upon completion of this step, the average values will be determined with the required accuracy. In practice, measurements during the training phase are experiments that involve placing client devices at different points in the selected slices. Device placement positions can be randomly selected within slices. This stage is similar for both the first and second variants of the system implementation, except that in the second variant the client devices are equipped with a specialized client application. In practice, other elements can be used as elements for dividing the area or volume of the considered room “slices”, and not necessarily of equal size. For example, rooms, halls, corridors and other room elements that are easy enough to localize can be selected as such elements. It is likely that elements of complex configuration, such as long winding corridors, will be difficult to describe unambiguously. In such cases, it makes sense to introduce a conditional division of these elements into some fragments. In any case, as a result of dividing the premises into elements to be localized, a plan must be built, according to which further “training” of the system is carried out. At the operation stage, measurements of signal levels from subscriber devices are carried out and for each of the measurements, the distance of Mahalanobis (2) to the center of each of the slices is calculated. After that, each of the devices is associated with that slice, the distance to which is minimal (3). This correspondence is the solution to the localization problem. Further, the results of localization are displayed, if necessary, and the work cycle is repeated. The repetition period of the localization cycle depends on the degree of user mobility and in practical tasks can be from seconds to several minutes. The repetition period of the localization cycle depends on the degree of user mobility and in practical tasks can range from seconds to several minutes. It is also worth noting here the feature of subscriber terminals associated with the transition to the low consumption mode “sleep mode”. As noted above, in this state, it becomes impossible to track the position of the terminal; therefore, the measurement frequency should be selected taking into account the peculiarities of the terminals and their software.

244

A. I. Paramonov et al.

Fig. 5. The algorithm of the positioning system

The Method for User Localization in the Local Wireless Network

245

When using client applications, this task is simplified due to the fact that they can potentially have access to the sensors of subscriber terminals and react to human behavior. In this case, the client terminal can initiate the update of the position data.

4

Conclusion

The analysis showed that the use of WLAN for localization tasks in the event of an emergency can significantly increase the availability of information both about people in the danger zone and information coming to them from the control center. The ability to localize users via the web is the most important factor in improving the efficiency of search and rescue operations. Therefore, when building modern WLANs and integrating them into companies’ information systems, attention should be paid to the aspect of the applicability of these systems for localization tasks in the event of an emergency. This concerns both the information systems themselves from the point of view of software implementation at the level of solving applied problems, and the development of specialized client software. The ability to localize users using web-based tools or additional tools is a critical factor in improving the efficiency of search and rescue operations. The possibility of organizing a stable ad hoc network based on direct connections between subscriber terminals makes it possible to promptly deliver information to users about action plans in a given situation, as well as deliver information to the control center about the current state. Summarizing the analysis, it should also be noted that the greatest efficiency of the system is achieved with the integrated use of all available tools to increase the availability of information. Therefore, when building modern WLANs and integrating them into information systems, a company should pay attention to the aspect of the applicability of these localization systems in the event of an emergency. This applies to both information systems in terms of software implementation at the level of solving applied problems, and the development of specialized client software. Acknowledgment. The publication was prepared with the support of the “RUDN University Program 5–100”.

References 1. IEEE Std 802.11 - 2016. IEEE Standard for Information technology – Telecommunications and information exchange between systems. Local and metropolitan area networks – Specific requirements. Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, 3534 p. IEEE, New York (2016)

246

A. I. Paramonov et al.

2. Muthanna, A., et al.: Analytical evaluation of D2D connectivity potential in 5G wireless systems. In: Galinina, O., Balandin, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART -2016. LNCS, vol. 9870, pp. 395–403. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-46301-8 33 3. Makolkina, M., Koucheryavy, A., Paramonov, A.: Investigation of Traffic Pattern for the Augmented Reality Applications. In: Koucheryavy, Y., Mamatas, L., Matta, I., Ometov, A., Papadimitriou, P. (eds.) WWIC 2017. LNCS, vol. 10372, pp. 233– 246. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-61382-6 19 4. Abdellah, A.R.: IoT traffic prediction using multi-step ahead prediction with neural network. In: Abdellah, A.R., Mahmood, O.A.K., Paramonov, A., Koucheryavy, A (eds.) 11th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), p. 8970675 (2019) 5. Paramonov, A., Vikulov, A., Scherbakov, S.: Practical results of WLAN traffic analysis. In: Galinina, O., Andreev, S., Balandin, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART/NsCC -2017. LNCS, vol. 10531, pp. 721–733. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-67380-6 68 6. Paramonov, A., Hussain, O., Samouylov, K., Koucheryavy, A., Kirichek, R., Koucheryavy, Y.: Clustering optimization for out-of-band D2D communications. Wirel. Commun. Mobile Comput. 2017, 1–11 (2017). Article ID: 6747052 7. Andreev, S., Galinina, A., Pyattaev, S.: 5G Multi-RAT LTE-WiFi ultra-dense small cells: performance dynamics, architecture, and trends 1.0. IEEE J. Sel. Areas Commun. 33(6), 1224–1240 (2015) 8. Kim, J.-O., Mueller, C.W.: Factor Analysis: Statistical Methods and Practical Issues. Sage, Beverly Hills (1986). Eleventh Printing, 215 p 9. Ahrens, H., Lauter, J.: Mehrdimensionale Varianzanalyse. Academie-Verlag, Berlin (1981). 226 p 10. Vladyko, A., Paramonov, A., Kirichek, R., Koucheryavy, A.: Using the IEEE 802.11 family of standards for communication between robotic systems. In: Advances in Intelligent Systems Research. Vol. 133, pp. 153–157 (2016)

Analysis of the Using of D2D Communications for the Ad Hoc Network Based on Subscriber Terminals A. Paramonov1,2(B) , T. Tatarnikova3 , and A. Marochkina3 1

The Bonch-Bruevich Saint-Petersburg State University of Telecommunications, Bolshevikov, 22, Saint-Petersburg, Russia [email protected] 2 RUDN University, Miklukho-Maklaya str.6, Moscow, Russia 3 Russian State Hydrometeorological University, Voronezhskaya ulitsa, 79, Saint-Petersburg, Russia

Abstract. The article presents the results of an analysis of the potential capabilities of a network built using D2D communications as an ad hoc network. It is shown that with a sufficient density of devices, it can provide a high probability of connectivity. It is also shown that for a network with moving nodes, the probability of connectivity depends on time. Such a network can operate as a network with acceptable delays. Analytical expressions are obtained that relate the probability of connectivity for both a static network and a network with mobile nodes with its main parameters. Keywords: Device to device · Ad hoc · Connectivity probability · Network with mobile nodes · Delivery time · Network with acceptable delays

1

Introduction

Mobile network subscriber terminals are currently high-tech devices that combine the capabilities of a computer and a high-speed wireless access modem. Moreover, these devices are equipped with transceivers that support many standards for wireless data transmission. Almost all subscriber terminals have support for standards of wireless access networks of the IEEE 802.11 family. These are extremely popular technologies that enable high-speed data transmission over relatively short distances. Currently, this functionality has been supplemented by technologies based on IEEE 802.11 standards, which allow creating direct deviceto-device D2D connections [1]. This feature allows you to simplify the connection of the smartphone to various devices (TV, printer, monitor) as well as to other smartphones for data exchange. This technology is called WiFi-direct. There are many client applications that use this technology to organize communication Supported by RUDN University. c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 247–258, 2020. https://doi.org/10.1007/978-3-030-66242-4_20

248

A. Paramonov et al.

between external devices and between users: chats, voice communication, file transfer, screen sharing, etc. The possibility of establishing communication and data transmission to neighboring devices located in the communication zone opens up the potential for the implementation of transit transmission (from device to device) over distances exceeding the communication range between two neighboring nodes. In fact, this means the possibility of building an ad hoc network [2,3] using subscriber terminals. Of course, the capabilities of such a network are determined by the location and behavior of its nodes. For example, if the nodes are mobile, that is, there is a non-zero probability that the node that received the message, but does not have the ability to broadcast it immediately after receiving, after some time move and will be in the communication zone of the destination node and deliver this message. If the requirements for delivery time are not too strict, but allow a certain delay, then such a network will allow it to be implemented even in the absence of coverage of the mobile communication network [4]. Probably, such an opportunity can be very useful in emergency situations or in cases of low user density and the absence of other means of communication. On the other hand, in the case of a high density of subscriber units, which takes place in modern communication networks, there is a potential for delivering messages over considerable distances [2]. This capability allows delivering a portion of the traffic using only the capabilities of the terminals, i.e. bypassing the operator’s network infrastructure. This makes it possible to somewhat relieve the operator’s communication network and, in some cases, improve the quality of traffic service.

2

Model

We will consider a flat surface, assuming that users are distributed on it randomly. The user area is not limited. User density ρ number of users per unit area 1/m2 . It should be noted that in the general case, one should consider the network in some three-dimensional space, since in practice, it can be located in a multistorey building or structure. However, in reality, the model described above does not reduce the generality of further reasoning. The transition from a flat model to a three-dimensional model consists only in the introduction of one more coordinate and a corresponding transition from the description of flat geometric figures to three-dimensional, which is not very difficult. However, this can complicate the display and reduce the visibility of the model. In the proposed model, we will assume that the surrounding space is isotropic; the receiving-transmitting antennas of the network nodes are also isotropic. Under such assumptions, the communication area of a node can be described by a circle with a certain radius R. Most of the short-range wireless communication technologies, including the IEEE 802.11 standards, assume some dependence of the communication quality (channel) on the distance between the nodes: the receiver and transmitter, sources of interference, i.e. on the signal-to-noise ratio, depending on the attenuation of the signal in the environment. The channel quality is characterized by the data transfer rate. In this problem, we will assume that the admissible

Analysis of the Using of D2D Communications for the Ad Hoc Network

249

Fig. 1. Network model

delivery time is much longer than the data transmission time over the communication channel, even in the case of its low quality. Therefore, this dependence practically does not affect the functioning of the network. Based on this, the node’s communication zone model only describes the communication possibility, i.e. the presence or absence of the possibility of data transmission (Fig. 1). Let us describe the network of users in a random graph. Then the probability of the existence of a route between any two terminals (taking into account transit) for a sufficiently large number of subscribers can be estimated according to one of the theorems of Erd¨ os-Renyi [5–7] or Bollobash-Riordan [7], depending on the density of nodes, as shown in [8]. At a high density of network nodes, for example, in a city, the connectivity is determined by the communication distance of the node (communication radius) and the number of nodes, according to the Erd´es-Renyi theorem, with a “critical” value of the connection probability of the node p0 =

ln n n

(1)

where n is the number of nodes in the network. For a flat model, the probability of falling into the communication zone of a node of at least one neighboring node, with their uniform distribution will be determined as pˆ0 = 1 − p(0) = 1 − e−πR

2

ρ

(2)

where p(0) is the probability that there will be no nodes in the communication zone. Equating (1) and (2) we obtain the expression for R

250

A. Paramonov et al.



  ln n 1 ln 1 − − πρ n

(3)

  1 ln n ρ0 (R, n) = − 2 ln 1 − πR n

(4)

R0 (ρ, n) = and expression for node density

Expressions (1) and (2) allow us to estimate the minimum values of the communication radius and density of devices, respectively. The dependence of the radius on the density and number of devices is shown in Fig. 2. Unlike [5] and [7], the above expressions do not require knowledge of the boundaries of the service area, due to the fact that the probability of a node’s connectivity is determined through expression (2). It should be noted that according to the aforementioned theorem, these are critical values that are defined as an intermediate state, a phase transition, from a disconnected state of a network to a connected one. Providing connectivity in the network is achieved at R > kR0 and ρ > kρ0 Where k ≥ 1 is the coefficient that ensures the network goes into a connected state. There is no exact expression for estimating this coefficient, however, from the results of simulation it was found that for k ≈ 2 the probability of network connectivity tends to unity. From the above dependence it is seen that the required radius of the communication zone of the node decreases with increasing density of nodes and their number. This is the expected result, since with the growth of these parameters the likelihood of a neighboring node getting into the communication zone also increases. It should be noted here that in this model, we do not take into account the interference created by neighboring nodes, the total power of which also increases with increasing node density. This negatively affects the quality of communication, which physically manifests itself in a decrease in the radius of the actually possible communication. However, this effect manifests itself in the case of activity of neighboring nodes, i.e. in case of relatively high network load. We consider a relatively low network load with traffic, while we assume that the probability of activity of neighboring nodes at the time of message transmission is negligible. With a low density of nodes, according to (1), the likelihood of connectivity is low; therefore, a static model with fixed nodes shows that this network is practically unsuitable for communications. However, With moving nodes, the network properties change, because routes in such a network are not static. If the movement of the node is accidental and in no way limited, then for a sufficiently long time, with a probability close to unity, it will be in the communication zone of the destination node. Therefore, in such a network, one should not consider a static characteristic of connectivity, but the route length and delivery time. Let the node move with an average speed v, then in time τ the communication zone of the node will cover an area equal to

Analysis of the Using of D2D Communications for the Ad Hoc Network

251

Fig. 2. Dependence of the minimum communication radius on the density and number of network nodes.

S(τ ) = 2Rvτ

(5)

then the probability of at least one node falling into this area p>0 (τ ) = 1 − e−S(τ )ρ = 1 − e−2Rvρτ Equating expressions (5) and (1) we obtain the expression for τ   ln n 1 ln 1 − τ0 (v, n) = − 2Rρv n

(6)

(7)

The dependence of the time during which the connectivity of the mobile network is provided on the number of nodes and the average speed is shown in Fig. 3. The figure shows that the average delivery time decreases with an increase in the average speed of nodes and network capacity (number of nodes). The results obtained should be an illustration of the relationship between the main parameters of the DTN. In specific cases of network implementation, the peculiarities of the movement should be taken into account.

252

A. Paramonov et al.

The time estimate according to (7) gives only the lower boundary τ at which the state of the phase transition is reached, if we follow the analogy with the static model. Ensuring connectivity in the network is achieved when τ > kτ0 . Where k ≥ 1 is the coefficient that ensures the network goes into a connected state. It can be seen from the figure that the average delivery time decreases with increasing average speed of nodes and network capacity (number of nodes). The results obtained illustrate the relationships between the main parameters of the DTN. In specific cases of network implementation, traffic features should be considered.

Fig. 3. The dependence of the connection time on the average speed of nodes and their number.

According to the Erd´es-Renyi model, the average path length is of the order of g(n) ∝ ln n, while for the Bollobash-Riordan model this value is g(n) ∝ lnlnlnnn . g(n) ∝

ln n ln ln n

(8)

Analysis of the Using of D2D Communications for the Ad Hoc Network

253

An illustration of the dependence of the average path length on the number of nodes in the network for the Erdos-Renyi (I) and Bollobash-Riordan (II) models is shown in Fig. 4. It can be seen from the above graph that in the case of a network with a low density of nodes (sparse graph), the expected path length (in the number of transits) is significantly less than for a network with a relatively high density.

Fig. 4. Dependence of the average path length in the network for models I and II on the number of nodes.

We will assume that the delivery processes on each of the route sections are independent, then for the full route the delivery time will be determined as g(n) = τ (v, n)g(n)

(9)

The dependence of the delivery time on the number of network nodes and the average speed of the nodes movement is shown in Fig. 5. The graph shows that the delivery time decreases with an increase in the number of network nodes and the average speed of their movement. This is the expected result since an increase in the number of nodes entails an increase in the probability of connectivity according to (1), and an increase in the speed of movement of nodes leads to its increase according to (6).

254

A. Paramonov et al.

Fig. 5. Dependence of the average delivery time on the number of network nodes and the average speed of their movement.

It is easy to see that with fixed nodes, the delivery time, according to (7), the average delivery time tends to infinity. This is not entirely obvious, but under the accepted assumptions, this is exactly the case, since the delivery time in the considered network is determined only by the time of “waiting” for the connected state. At a low density of nodes, when the distances between them significantly exceed the communication range, the probability of connectivity tends to zero, i.e. communication is only achieved at a non-zero speed. The important factors that determine the functioning of the network under consideration are the probability of message delivery and the number of transmitted messages. The mobility of nodes is a random process, therefore, the probability is nonzero that for a certain time interval τ0 a node will not be able to send a message due to the fact that there will be no connection with other nodes. According to the chosen model, it is equal to p0 (τ0 ) = e−2Rvρτ0

(10)

Then, for a route of k sections, it will be pL (τ0 , k) = 1 − (1 − e−2Rvρτ0 )k

(11)

Analysis of the Using of D2D Communications for the Ad Hoc Network

255

where τ0 is the message lifetime (information relevance). Then the probability of message delivery (12) pD (τ0 , k) = (1 − e−2Rvρτ0 )k Expression (12) gives the probability of delivery of a message sent k times on each of the route sections if its lifetime (information relevance) is τ0 . This 2 dependence is shown in Fig. 6, where v = 6 m/s and ρ = 1 ∗ 10−6 users/m .

Fig. 6. Dependence of the probability of message delivery on its lifetime and the number of repetitions.

It can be seen from the given dependence that the probability of delivery increases with an increase in the message lifetime and the number of its repeats. An increase in the number of repetitions of a message leads to a significant increase in traffic in the considered network. If we assume that on each of the route sections the transit node performs an equal number of repetitions equal to k, then the total number of messages (message copies) in the network generated by the delivery of a single message will be η(n, k) = k d = k g(n)

(13)

Where k is the number of repetitions, d is the average length of the route, determined according to (8).

256

A. Paramonov et al.

Figure 7 shows the dependence of the number of messages produced in the network on the number of repetitions and the length of the route, expressed in terms of the number of nodes in the network, according to (8).

Fig. 7. Dependence of the number of messages produced in the network on the number of repetitions and the number of network nodes.

It can be seen from the above illustration that as the number of repetitions of a message increases, the number of messages generated in the network increases rapidly. This is the expected result. However, it should be noted that this growth rate, in the case of a network with a low density of nodes, is “softened” by the dependence of the route length on the number of network nodes, according to the chosen model (8). Due to this, the number of messages produced in the network, per one outgoing message, grows according to the logarithmic law with the increase in the size of the network, which makes it possible to obtain values that are within the actually permissible limits (tens of messages). Under the above assumptions about low node density and low traffic intensity, such values are quite acceptable, and the time indicators are within reasonable limits.

Analysis of the Using of D2D Communications for the Ad Hoc Network

257

Thus, modeling has shown that the time and probability of message delivery in a network with a low density of nodes with admissible delays makes it possible to obtain an information transfer service that is quite suitable for practical applications.

3

Conclusion

The above reasoning and models describe the potential capabilities of a communication network built using D2D communications. Believing that it can be organized as a peer-to-peer ad hoc network. The properties of such a network significantly depend on the density of nodes, which determines the probability of connectivity in a static mode, i.e. with stationary network nodes. Of particular interest is a network with mobile nodes, which potentially allows the delivery of messages with a low density of terminals, such that in a static mode the probability of network connectivity is close to zero. With moving nodes and low density, the probability of connectivity is determined by time. The constructed models allow us to estimate the average time required to ensure connectivity, i.e. delivery of the message. This time depends on both the average speed of movement of the nodes and the average length of the route. In theory, all messages on such a network will be delivered if their lifetime (life) is not limited. In practice, given the limited lifetime of a message, there is a nonzero probability of loss. To increase the probability of delivery, it is necessary to increase the number of sent messages (attempts to send). This leads to an increase in network traffic, due to the fact that the number of message copies increases at each segment of the route. However, with a relatively low density of network nodes, this number is quite acceptable. In general, the analysis showed that the potential capabilities of modern subscriber terminals make it possible to organize an ad hoc network with a fairly high probability of connectivity. This possibility exists both in static networks with fixed nodes and in networks with a relatively low density of mobile nodes, as a network with acceptable delays. Network parameters such as connectivity probability, required communication range, node density, and message delivery time can be estimated using theorems from random graph theory. The practical implementation of such a network requires the development of appropriate protocols and client applications that can be used as an additional means of communication in cases of low availability of other networks. Acknowledgment. The publication was prepared with the support of the “RUDN University Program 5–100”.

References 1. Paramonov, A., Hussain, O., Samouylov, K., Koucheryavy, A., Kirichek, R., Koucheryavy, Y.: Clustering optimization for out-of-band D2D communications. Wirel. Commun. Mobile Comput. 2017, 1–11 (2017). Article Id: 6747052

258

A. Paramonov et al.

2. Mahmood, O., Paramonov, A.: Peculiarity of the internet of thing traffic routing, selection of the gateway location. In: Workshops ICUMT 2018 (2018) 3. Mahmood O.A., Paramonov, A.: Optimization of routes in the Internet of Things. In: 18th International Conference on Next Generation Wired/Wireless Networking (NEW2AN), pp. 584–593 (2018) 4. Muthanna, A., et al.: Analytical evaluation of D2D connectivity potential in 5G wireless systems. In: Galinina, O., Balandin, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART -2016. LNCS, vol. 9870, pp. 395–403. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-46301-8 33 5. Paramonov, A., Nurilloev, I., Koucheryavy, A.: Provision of connectivity for (heterogeneous) self-organizing network using UAVs. In: Galinina, O., Andreev, S., Balandin, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART/NsCC -2017. LNCS, vol. 10531, pp. 569–576. Springer, Cham (2017). https://doi.org/10.1007/978-3-31967380-6 53 6. Nurilloev, I., Paramonov, A., Koucheryavy, A.: Connectivity estimation in wireless sensor networks. In: Galinina, O., Balandin, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART -2016. LNCS, vol. 9870, pp. 269–277. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-46301-8 22 7. Abdulkareem Mahmood, O., Muthanna, A., Paramonov, A.: Data delivery algorithm for latency sensitive IoT application. In: Galinina, O., Andreev, S., Balandin, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART -2019. LNCS, vol. 11660, pp. 467– 480. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-30859-9 40

Channel Switching Threshold Strategies for Multichannel Controllable Queuing Systems A. S. Mandel1(B) and V. A. Laptin2 1

2

V.A. Trapeznikov Institute of Control Sciences RAS, Profsoyuznaya 65, Moscow, Russia [email protected] M.V. Lomonosov Moscow State University, Lenin hills 1, Moscow, Russia [email protected]

Abstract. This paper deals with a controllable queuing system in which the number of switching service channels monitor and modify at control time points spaced apart by a fixed time step. At transition from step to step, the intensity of the simplest incoming flow changes in accordance with a Markov’s chain. The system is in a stationary mode between the steps. A cost function is the minimization of the total average cost of the system over a multi-step planning period. The problem is to find a channel switching strategy. The parametric structure of an optimal strategy significantly simplifies its construction. Keywords: Controllable queuing systems · Markovian incoming flow Switching strategies · Strategy parameterization

1

·

Introduction

In this paper, we consider one of the problems related to the scope of the theory of controlled queuing systems, which began with the works of V. Rykov and summed up by him in his fundamental survey article [1], see also [2–4]. The peculiarity of the proposed work is that the process of channel switching control in a multichannel queuing system is considered using the criterion for obtaining the maximum average profit from the operation of the system on a multistep time interval. The solution is reduced to the analysis of stochastic dynamic programming algorithms and develops the results obtained in the monograph [5], taking into account the specifics of the problem under study. In accordance with the conclusions of the general theory [1], control algorithms for channel switching processes turn out to be threshold. So, let us consider a problem of the theory of controllable queuing systems (QS) which develops and generalizes problem statements, that have been discussed in works presented at conferences DCCN15 [6], DCCN17 [7] and DCCN18 [8]. In the investigated QS the number of service channels can change at the c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 259–270, 2020. https://doi.org/10.1007/978-3-030-66242-4_21

260

A. S. Mandel and V. A. Laptin

moments of control, standing apart from each other by the value of fixed time step. In this case, as in [6], it is believed that the QS receives the simplest incoming flow, the intensity of which at the moments of control undergoes sudden changes, taking a finite number of values λi , i ∈ 1, k, from a discrete set Λ. We use the assumption that the duration of the control step (which is what we choose for the unit of time) is sufficient to establish in the QS a stationary, in the probabilistic sense, mode of operation. The aim is to form a strategy for switching service channels (disabling redundant service channels or introducing backup channels) in order to minimize the average cost of QS in a given N-step planning period.

2

Problem Statement

We discuss the QS, in which the number of service channels is a controllable value and can be changed at control moments periodically located on the time axis (with step 1) of control of the QS state. A matrix of transition probabilities of the corresponding homogeneous Markov’s chain P = pij , is given, where pij is the probability of transition (at the moment of control) from the intensity λi , i ∈ 1, k, at the previous step to the intensity λj , j ∈ 1, k at the next step. We use the assumption that the duration of the control step is sufficient to establish a stationary, in the probabilistic sense, operation mode in the QS in question at this step. If the intensity of the incoming flow at this step is equal to λi , while the intensity of service in one service channel is μ, then it is obvious [9,10], that the number of service channels in the QS should be chosen to satisfy the following inequality:   λi u ≥ ucritical (λi ) = ui = + 1. (1) μ Let us introduce a control quality function which for given: (a) number of steps n, remaining till the end of the planning period (n ≤ N ), (b) intensity of the incoming flow λi , i ∈ 1, k, (c) actual number of service channels m and (d) decision on the switched number of service channels u is described by the value of average total cost Cn (λi , m, u). The aim is to minimize Cn (λi , m, u) by choosing the channel switching strategy. This cost is mathematical expectation of a sum of one-step costs at the remaining n steps, along the trajectory of the incoming flow whose intensity changes in the Markovian jump-wise manner. Let us write an equation for one-step costs in the first step C (1) (λi , m, u): C (1) (λi , m, u) = Coper + Cqueue + Cswitch .

(2)

Here, the operating costs of the active systems in the first step Coper = c1 u, the cost of queuing in the stationary mode is Cqueue = d¯lqueue , where ¯lqueue is the average queue length, while the switching cost Cswitch can be presented as: ⎧ ⎪ if u > m; ⎨A1 , (3) Cswitch = 0, if u = m; ⎪ ⎩ A2 + c2 (m − u), if u < m.

Channel Switching Strategies

261

We will now use classical results [9,10] to write down: ¯lqueue =

u−1 (uρi )k k=1

k!

u

(uρi ) + u!(1 − ρi )

−1

u

(uρi ) ρi , u!(1 − ρi )2

(4)

λi where ρi = uμ . Now, if under the assumptions made we denote through Cn∗ (λi , m) the minimum possible value of the average total cost in the last n steps of the control process, it is logical to write the following system of discrete dynamic programming equations: (5) C1∗ (λi , m) = min C (1) (λi , m, u), u≥ui

Cn∗ (λi , m)

= min (C u≥ui

(1)

(λi , m, u) + α

k

∗ pij Cn−1 (λj , u)),

(6)

j=1

where i ∈ 1, k, α is the discount factor, 0 ≤ α ≤ 1, while n ∈ 2, N .

3

A-convexity in Discrete Problems of Optimization

We consider function g(i) of the variable i, taking values from the finite segment of the natural series: i = 1, 2, . . . , k. Definition 1. The function g(i) is called convex (downward) if for all natural i and j: g(i + j) − g(i) − Δ(1) g(i) × j ≥ 0, (7) where Δ(1) g(i) is the first difference of g(i) function in point i: Δ(1) g(i) = g(i) − g(i − 1). The necessary and sufficient condition for the convexity (downward) of the function is fulfilling the inequality Δ(2) g(i) ≥ 0, where Δ(2) g(i) is the second difference of g(i) function in point i. In fact, let j from definition 1 be 1, then formula (7) is written as Δ(1) g(i + 1) ≥ Δ(1) g(i), i.e. the first difference of g(i) is rejected by the monotonically increasing function, i.e. Δ(2) g(i) ≥ 0. Prove of the sufficiency is similar. Definition 2. Function1 g(i) is called A-convex (A ≥ 0), if for all natural i and j: (8) A + g(i + j) − g(i) − Δ(1) g(i) × j ≥ 0.

1

The concept of A-convexity was proposed by Herbert Scarf [12] to analyze the properties of optimal decision making (control) strategies in inventory control problems in the presence of fixed supply costs that do not depend on the size of supply, adding to them the amounts determined by the size of the supply batch.

262

A. S. Mandel and V. A. Laptin

For functions of discrete variables, all the properties of A-convex functions noted by Herbert Scarf [12] are retained. Namely: Property 1. If g(i) is A-convex, then for any natural j the function g(i + j) is also A-convex. Property 2. If function g1 (i) is A1 -convex, and function g2 (i) is A2 -convex, then for any θ1 , θ2 > 0, function g(i) = θ1 g1 (i) + θ2 g2 (i) is also (θ1 A1 + θ2 A2 )-convex. Property 3. If function g(i) is A1 -convex, then it is also A2 -convex for any A2 > A1 . k Property 4. Let i be a random value with distribution pi k1 , pi > 0, i=1 pi = 1, k and let function g(i) be A-convex. Then, function α i=1 pi g(i), with α ≥ 0, is also A-convex.

4

Properties of Optimal Channel Switching Strategies

Let us revisit the problem of investigating properties of solutions to the system of dynamic programming equations (5)–(6). Some words about the plan of this section to present the following results: • review of the qualitative features of “myopic” inventory control strategies; • broadening of the concept of A-convexity for the problems of the examined type; • transfer of results obtained for “myopic” strategies to multistep (dynamic) control problems. 4.1

“Myopic” Strategies of Control

This subsection briefly (with minor corrections) retells the content of the work [8] by the same authors. In order to build an optimal “myopic” switching strategy, one has to find: ⎧ ⎪ ⎨A1 1l(u − m), min C (1) (λi , m, u) = min {c1 u + d¯ lqueue + min 0, u≥ui u≥ui ⎪ ⎩ A2 1l(m − u) + c2 (m − u),

}, (9)

where 1l(u) denotes the function of a unit jump (Heaviside’s function) which is equal to 1, if u > 0, or 0 in all other cases. The main results obtained in [8] are that for each state i = 1, 2, ..., k, there are five critical parameters that fully determine the “myopic” inventory control (1) (1) (2) (2) strategy: ui (defined by formula (1)), r1,i , R1,i , r1,i and R1,i . Moreover, the

Channel Switching Strategies (1)

(1)

(2)

263

(2)

last four parameters are arranged as follows: r1,i < R1,i ≤ R1,i < r1,i , while a “myopic” channel switching strategy obeys the formula2 : ⎧ (1) (1) ⎪ ⎪ ⎪R1,i , if m ≤ r1,i (switching on), ⎪ (1) (1) ⎨m, if r1,i < m ≤ R1,i , (10) u= (2) (2) ⎪m, if R1,i ≤ m < r1,i , ⎪ ⎪ ⎪ ⎩R(2) , if m ≥ r(2) (switching off). 1,i 1,i It should be noted that in [8], as already noted, the discussion was conducted at a purely qualitative level and did not take into account, in particular, the discreteness of one of the QS state variables. Using the technique briefly outlined in Sect. 3 of this paper, it is possible to reformulate and strictly prove all the statements made in [8]. In contrast to [8], in this paper, the last four characteristic parameters of an optimal “myopic” strategy have one more sub-index, in this case equal to 1. In one of the subsequent paragraphs, this unit will transform into n the number of steps left until the end of the planning period for the multistep problem). If this has not been the case, we would have to take care of “sliding” modes, when at first we would have to switch off part of the channels (bringing the (2) number of active channels to R1,i ), but immediately after that, under certain circumstances, we would have to switch on part of the channels, returning the (1) QS to another parameter – R1,i ), etc. It does not seem to be much of a trouble, but there is one more and probably more difficult task. The above fact necessitates one more decomposition of Cn (λi , m, u) criterion of the initial problem (5)–(6). In other words, two alternative managerial decision options are considered separately: (a) to enable additional channels or, conversely, (b) to disable some active channels. At the same time, the fee for enabling is described by the function Bswitch on (u) = c1 u + d¯lqueue , while the fee for disabling is described by the function Bswitch off (u) = (c1 − c2 )u + c2 m + d¯lqueue , where ¯lqueue is obtained from the formula (4) and all designations coincide with those introduced above. It is the type of functions that gives rise to the inequal(1) (2) (1) ity R1,i ≤ R1,i . It is also important to note that R1,i is the point of the absolute (2)

minimum of the one-step cost function when channels are enabled, and R1,i is the point of absolute minimum of one-step cost function when channels are disabled. 4.2

Broadening of the Notion of A-convexity

The proof of the facts listed in paragraph 4.1 based on the analogy between the problems of inventory control theory and those of queuing systems theory, which was important feature discussed in the present and previous works of the first 2

The application of formula (9) is associated with certain caveats, the essence of which (1) is that in some cases listed in [8], the parameter R1,i is assigned equal to ui . There are other nuances as well.

264

A. S. Mandel and V. A. Laptin

author. An example of the original analysis of such analogies is the paper [13]. The problem of inventory control discussed in [13] the authors called “fantastic”3 . Nonetheless, we cannot but admit that for the class of problems under consideration (both “fantastic” from the theory of inventory control and the problem of channel switching of QS theory), some unpreparedness and unsuitability of the existing theory of optimization and the theory of convexity for the solution of these problems was evident. The point is that in the mathematical description of the class of problems in question, not one but two different concepts of optimality (optimality criteria) are used. Speaking a language adequate to this class of problems, it is the optimality of enabling channels (when placing orders in inventory control theory), when we move along the axis of an integer variable u left-to-right, and the optimality of disabling channels (returning goods in inventory control theory), when we move along the axis of the variable right-to-left. We shall wrap this remark into new definitions. Definition 3. Function g(i) is referred to as A-convex from the left (A ≥ 0), if for all natural i and j, which are to the left of the point of its absolute minimum, A + g(i + j) − g(i) − Δ(1) g(i) × j ≥ 0. Definition 4. Function g(i) is referred to as A-convex from the right (A ≥ 0), if for all natural i and j, which are to the right of the point of its absolute minimum, A + g(i + j) − g(i) − Δ(1) g(i) × j ≥ 0. We now can state that the enabling function in the one-step (“myopic”) problem is A1 -convex from the left, whereas the disabling function for the same problem is A2 -convex from the right. 4.3

Multi-step Dynamic Problems of Channel Switching

Let us return to the solution of the multistep problem of channel switching control, which is described in Eqs. (5)–(6). We repeat the notation of goal function in Eq. (6): Cn∗ (λi , m) = min (C (1) (λi , m, u) + α u≥ui

k

∗ pij Cn−1 (λj , u)).

(11)

j=1

The expression in braces in the right hand side (r.h.s.) of this equation, regardless of which alternative is estimated (on or off), contains a non-modifying l ∗ term α j=1 pij Cn−1 (λj , u). The one-step add-on C (1) (λi , m, u), by contrast, varies when the alternative is changed. From this we can conclude that there is every reason to believe that the expression in braces in the r.h.s. of formula (6) 3

Fantastic in [13] was the assumption that a warehouse could not only submit replenishment orders, but also return the goods to their suppliers.

Channel Switching Strategies

265

(also two-variant) is simultaneously A1 -convex from the left and A2 -convex from the right. Assume mathematical induction that this statement is true for any n. As it follows from [8], for the case n = 1 it is so. Suppose now that this statement is true for the case n − 1. Further proof of the truth of this statement for the case n is quite tedious (in terms of mathematical computation), but, in fact, is carried out according to the classical scheme of proof of optimality, but for two-level strategies [11,12]. As noted above, an important feature that helps avoiding the risk of “pitfalls”, like sliding modes, is the ordering of the local minimum points of alterna(1) (2) tive functions in the form of inequalities Rn,i ≤ Rn,i , n ∈ 1, N , i ∈ 1, k. It should be admitted here that the authors managed to prove this statement for strictly n = 1 case only. As for the arbitrary value of n, we can only argue that in the entire range of computational experiments performed there was not a single case of failure to fulfill these inequalities. The authors hope that in the near future they will manage to find a strong solution to this problem.

5

Simulation Example

The system of equations for discrete dynamic programming (11) has one interesting feature in the case when the intensities of the incoming flow for all steps of the process under study are known before planning. Of course, in this case, it is not difficult to calculate the minimum total costs, however, with a large number of steps and a large number of service channels, the calculations can require a lot of computer time (for the exhaustive search method). This system of equations allows not only to do this in a linear (on the number of steps) time, but also to find out the correct order of switching the service channels at each step of the process under study (route). To begin with, let us show that the threshold channel switching strategy, which is valid for the one-step case with a fixed initial number of service channels m, turns out to be non-optimal already for the multistep case, when the intensity of the incoming flow for each step is known in advance (before planning). If we are guided by this policy and at each step choose the value of the number of service channels that implements the minimum costs specifically at this step, then the minimum costs for the entire process cannot be found. However, the threshold strategies themselves take place, since they help to calculate all the available options for switching service channels. To do this, consider an example of a simple 3-steps process. Moreover, it will be enough to find the optimal strategy simply by going through all the available options (this is possible due to the small size). Then find a step that does not correspond to the optimal threshold strategy for the one-step case with a given initial number of service channels. You can even give an example of a thought experiment when the number of channels is the same in the previous and next steps. In order not to spend money on switching, you can incur large costs at the current step, but win in the whole process.

266

A. S. Mandel and V. A. Laptin

Let’s move on to an example of a 3-steps multistep process. Let’s choose the following values for this example: c1 = 1, c2 = 0, A1 = A2 = 1, the set Λ = {28, 18, 28}, d = 1, umax = 10. Based on these data, it is possible to compile tables of the dependence of the total cost functional on the initial number of service channels and the number of channels after making a control decision for each step separately, shown in Figs. 1, 2 and 3. In these tables, the rows correspond to the value of the number of service channels at the beginning of the step, and the columns represent the number of channels after the control decision is made. That is, if at the 1st step we had the initial number of service channels equal to 6 (corresponds to the 6th row in the table in Fig. 1), then the minimum total costs will be realized if we connect two more service devices (see Fig. 1 – 6th row, 8th column). Cells with a NaN value correspond to less than the critical number of channels. The critical values are 6, 4 and 6, respectively. It is clearly seen at the 2nd and 3rd steps (see Fig. 2 and 3) not only the number of available rows and columns is not equal to each other, but also at the previous and current steps the critical values of the service channels are different.

Fig. 1. Dependence of total costs on the initial and selected number of service channels for the 1st step.

After going through all the available options, we find that the minimum total costs for the 3-steps process are about 25 units, while the optimal route is described by the set {7, 7, 7}. That is, having chosen the initial number of channels equal to 7 at the first step, it is most advantageous not to switch at all anymore. Although the minimum value for each step separately is not implemented in any of the cases of this route. Let us now try to compose another route, choosing at each step the minimum value of the total costs. For the 1st step, the minimum will be delivered by the initial choice of the number of channels equal to 8, it is also the final one for the

Channel Switching Strategies

267

Fig. 2. Same as in Fig. 1, but for the 2nd step.

Fig. 3. Same as in Fig. 1, but for the 3rd step

1st step, the corresponding value of the minimum cost at the step is 8.63. Then, at the 2nd step, the initial number of channels will be 8, and the minimum will be realized when 5 channels are turned on and equal to 7.08. At the 3rd step, the initial number of channels will be 5, and the minimum will be at 8 and equal to 9.63. Then the total costs will be approximately 25.35 and more than 25, obtained by the exhaustive search method. Moreover, it turns out that the optimal values of the service channels for each step lie between the values of the number of channels that realize the minimum cost for each step taken separately. This is all true only in the case when the intensity of the incoming flow for each step is known in advance, even before the start of planning. From the results obtained above, the problem arises of finding the optimal route that minimizes the functional of total costs for the entire process. You can represent this in a more visual form by writing everything down in a table

268

A. S. Mandel and V. A. Laptin

(see Fig. 4), where the rows correspond to the step number (written in direct time), and the columns correspond to the initial number of channels. There is a feeling that the optimal channel switching strategy in this case can be “lost” in this dynamic programming equation. However, after running in the opposite direction, you can restore all the values of the number of service devices that should be selected.

Fig. 4. Total costs for a 3-steps process

To restore the “route” obtained using the dynamic programming equation, it will be necessary to create a table similar to the table in Fig. 4 (that is, the rows also correspond to the numbers of steps, and the columns correspond to the number of initial service channels) with the values of the number of service channels after making the control decision (see Fig. 5). Next, we find the minimum value of the total costs Cn (ξ) according to the table in Fig. 4 and the corresponding initial number of channels m. For this initial number m, we find the corresponding column in the table in Fig. 5 (1st row, 7th column) is already the number of service channels after making the control decision u. Next, go to the 2nd row of the table in Fig. 4 and select a column equal to the number of channels u, with which step 1 was completed. After going through all the rows sequentially, you can get the entire route; for this example it will be {7, 7, 7}, which corresponds to the result obtained by enumerating all the options. You can take a different initial number of channels as an example. Let, for example, m = 9. Then the total costs (see Fig. 4) will be approximately equal to 25.95, and the optimal route itself {9, 5, 8}.

Fig. 5. The number of service channels depending on the initial number

Hence, we can conclude that the dynamic programming equation (11) helps in a multistep process, with the intensity of the incoming flow for all steps known before planning, to choose the optimal solution that implements the minimum total costs. Moreover, the algorithm linearly depends on the number of steps, and its complexity is O(m2max n).

Channel Switching Strategies

6

269

Conclusion

The paper concerns with channel switching strategies in a multi-line queuing system with a Markov description of the input flow intensity change process. The objective function in strategy development is to minimize the total average cost in a multistep planning period. Thus it is assumed, that the procedure of channel switching (enabling or disabling) leads to the expenses which consist of the fixed payments and costs which size depends on the number of enabled or disabled channels. As a result, the optimal channel switching strategies turn out to be parametric and the optimal solution at each step depends only on four characteristic parameters. The proof process required introducing some generalizations of the A-convexity concept, classic for the operations research.

References 1. Rykov, V.: Controllable queueing systems: from the very beginning up to nowadays. Reliab. Theory Appl. 12, 39–61 (2017) 2. Rykov, V.V., Efrosinin, D.V.: To the slow server problem. Autom. Rem. Control 12, 81–91 (2009) 3. Rykov, V.: On a slow server problem. In: Li, H., Li, X. (eds.) Stochastic Orders in Reliability and Risk. Lecture Notes in Statistics, vol. 208, pp. 351–361. Springer, New York (2013). https://doi.org/10.1007/978-1-4614-6892-9 18 4. Rykov, V.V., Kozyrev, D.V.: Optimal control for scheduling with correction. In: Proceedings of the XII All-Russian Workshop on Control Problems, Moscow, 6–19 June 2014, pp. 8850–8854. ITP Ras (2014) 5. Sennott, L.I.: Stochastic Dynamic Programming and the Control of Queueing Systems. John Wiley & Sons, New York (1999). 358 p. 6. Mandel, A.: Econometric models of controllable multiple queuing systems. In: Vishnevsky, V., Kozyrev, D. (eds.) DCCN 2015. CCIS, vol. 601, pp. 296–304. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-30843-2 31 7. Mandel, A., Bakulin, K.: Models of controllable multiple queuing systems for channel switching myopic strategies. In: Proceedings of the 20th International Conference, Distributed Computer and Communication Networks, DCCN 2017, Moscow, Russia, Tecnhosphera, pp. 534–542 (2017). (in Russian) 8. Mandel, A., Laptin, V.: Myopic channel switching strategies for stationary mode: threshold calculation algorithms. In: Vishnevskiy, V.M., Kozyrev, D.V. (eds.) DCCN 2018. CCIS, vol. 919, pp. 410–420. Springer, Cham (2018). https://doi. org/10.1007/978-3-319-99447-5 35 9. Gnedenko, B., Kovalenko, I.: Introduction to The Queuing Systems Theory. Nauka, Moscow (1966). (in Russian) 10. Vishnevskiy, V.: Theoretical Principles of Computer Networks Design. Tecnhosphera, Bengaluru (2003). (in Russian)

270

A. S. Mandel and V. A. Laptin

11. Hadley, G., Whitin, T.M.: Analysis of Inventory Control Systems. Prentice Hall Inc., Englwood Cliffs (1967) 12. Arrow, K., Karlin, S., Scarf, H.: Studies in the Mathematical Theory of Inventory and Production. Stanford University Press, Stanford (1958) 13. Mandel, A., Granin, S.: Investigation of analogies between the problems of inventory control and the problems of the controllable queuing systems. In: Proceedings of 2018 Eleventh International Conference Management of Large-scale System Development (MLSD 2018), pp. 1–4. IEEE (2018). https://doi.org/10.1109/ MLSD.2018.8551852

Modeling and Simulation of Reliability Function of a k-out-of-n:F System Nika Ivanova1,2(B) 1

2

Peoples’ Friendship University of Russia (RUDN University), 6 Miklukho-Maklaya St., 117198 Moscow, Russian Federation nm [email protected] V.A.Trapeznikov Institute of Control Sciences of Russian Academy of Sciences, 65 Profsoyuznaya street, 117997 Moscow, Russia

Abstract. A hot standby repairable k-out-of-n system is studied. In one of the previous papers, reliability function for the case of k = 2 and k = 3 with exponential life and general repair time distribution have been found. Moreover, sensitivity analysis of their reliability characteristics to the shape of the repair time distribution of the system’s elements has been performed. In this paper, the problem of the asymptotic insensitivity of such a system when both life and repair time have general distribution is considered with a simulation approach. The results are presented for a special case of a 3-out-of-6:F system. Keywords: k-out-of-n system · Reliability function · Mathematical modeling and simulation · Markovization method · Sensitivity analysis · Python

1

Introduction

There are many examples of systems of k-out-of-n – type in various fields of human activity. They are used in areas such as telecommunication, transmission, transportation, manufacturing, and service applications. Therefore, the reliability study of k-out-of-n systems is useful not only from a theoretical point of view but also from a practical one. Unfortunately, the calculation of some reliability characteristics by analytical methods becomes difficult even when considering relatively simple systems. This task becomes more complicated in the case when the repair time of the system’s elements is supposed non-exponential. For this problem solution, the simulation methods can be applied for the necessary characteristics’ calculation. A k-out-of-n system is a repairable system that consists of n elements, and its behavior depends on how we determine the parameter “k”. If the system remains operational when k out of n elements fail, it defines as a k-out-of-n:G system. The publication has been prepared with the support of “RUDN University Program 5-100” program. c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 271–285, 2020. https://doi.org/10.1007/978-3-030-66242-4_22

272

N. Ivanova

In the other case, if the system fails, when k of its element fails, the system is denoted as a k-out-of-n:F system. In this paper, we consider the k-out-of-n:F system [1,2]. The importance of k-out-of-n systems’ application is confirmed by many studies as well as by the presence of various applied problems that are currently being solved using such models. For example, one of the crucial applications in this area is the reliability study of high-altitude unmanned rotor-craft platforms [3–5]. The multi-rotor architecture of such platforms allows a platform with n rotary-wing engines to stay operational even after k − 1 engines fail. Due to the continuous development and complication of such systems, their study is also becoming increasingly difficult and requires the usage of new methods. Therefore, researchers resort to new calculation methods, among which there is a simulation. One of the earliest results of these studies belongs to Barlow and Heidtmann. In 1984, they created a linear-time algorithm and its short computer program in BASIC for k-out-of-n:G system reliability computation [6]. In [7] the study was continued, and an improved version of the method for reliability calculation of the k-out-of-n:G system was presented. In the paper [8], the study of the reliability function of a homogeneous hot double redundant repairable system is extended with the help of a discrete-event simulation model. In [9], a simulation method is applied to calculate the steady-state probabilities of a heterogeneous double redundant hot standby repairable system. Further, some papers with a more complex k-out-of-n:G system structure appear. For example, one of the widely used configurations is a weighted kout-of-n:G(F) system, where the weight associated with each component can be considered as a load/capacity of that component. A weighted k-out-of-n:G systems are widely applied in various scenarios, such as multiple line (power/oil transmission line) transmission systems, where the accuracy of complex calculations is so significant, and simulation is also applied [10,11]. Note that the simple k-out-of-n:G system is a unique case of the weighted k-out-of-n:G system where the weight of each component is 1. For a weighted k-out-of-n system, the accuracy of the data obtained is essential since any error in the application of the model can have adverse consequences in practice. Thus, on the one hand, the simulation model will probably have a more complex structure, but on the other hand, it can help improve the results of analytical calculations. Simulation tools have many applications in different types of analysis and calculations. Among them, the calculation of stationary and non-stationary characteristics, sensitivity, and reliability analysis is of the key importance [12,13]. Nowadays, there are many various situations under which the above tasks are solved, and simulation modeling is applied. For example, consecutive k-out-of-n system [14]; a multi-state consecutive k-out-of-n:G [15]; three-unit series system under warm standby [16]; repairable and non-repairable systems with two types of independent failures [17]. Also, there are many works devoted to the study of the systems’ reliability as well as the sensitivity of its characteristics to the shapes of life and repair time distributions (see [18–22]).

Modeling and Simulation of Reliability Function of a k-out-of-n:F System

273

This paper continues these studies related to reliability and sensitivity and considers a hot standby repairable system using simulation with Python programming language. The article is organized as follows. In the next section, the problem setting and some notations will be introduced. In Sect. 3, a k-out-of-n:F system will present in a specific case of 3-out-of-6:F system, and analytical results of its reliability function and the meantime to failure will study. These results are performed in case of Poisson failure flow and general repair time distribution. In the 4-th Section, we present simulation results of the considered system with general distributions for both life and repair time in comparison with the analytical ones. The paper ends with a conclusion and some problem’s description.

2

Problem Setting and Notation

Consider a hot redundant k-out-of-n:F (k < n) reparable system. Such a system can be viewed as a system in parallel elements’ connection, which loses its work capability if any of its k elements fail (Fig. 1). The dashed line means that the system requires at least k of n elements to operate. The allocation of these elements is conditional since they are independent items and any k of n components may fail.

Fig. 1. A k-out-of-n : F system.

Suppose that – the system works till it first enters state k, which is the state of the system failure; – there is only one unit to repair a failed element; – the elements fail according to a Poisson flow with intensity α (for analytical results section only); – the random repair time of elements are independent and their common cumulative distribution function (c.d.f.) B(t) is absolutely continuous with probability density function (p.d.f.) b(t) = B  (t). The system state space can be represented as E = {0, 1, ...k}, where: – 0 means all n elements operate; – j means that j elements out of n (j = 1, k − 1) have failed, one of them is being repaired, and others (n − k) operate;

274

N. Ivanova

– k means that k elements have failed that is the system failure and its restoration, “DOWN” state. Using the so-called markovization method [23] introduce as a supplementary variable X(t) — the elapsed repair time of the element under repair, and consider a two-dimensional stochastic process Z Z = {Z(t) = (J(t), X(t)), t ≥ 0}, where the value J(t) represents the number of failed elements at time t. Due to the supplementary variable the process Z is a Markov one. Denote its micro-state p.d.f.’s concerning the supplementary variable in domain 0 ≤ x ≤ t < ∞ by πj (t; x)dx = P{J(t) = j, x < X(t) ≤ x + dx} (j = 1, k) and corresponding macro-state probabilities for t ≥ 0 by t πj (t) = P{J(t) = j} =

πj (t; x)dx. 0

The paper deals with the system’s reliability function R(t) = P{T > t}, where T is the system’s lifetime, T = inf{t : J(t) = k}.

3

Analytical Results for Reliability Function for 3-out-of-6 System

In order to avoid cumbersome calculations and being focused on applying the system to the multicopter model (for example, see [4,5]), this paper deals with the special case of a k-out-of-n: F system, when k = 3 and n = 6. To construct the appropriate Markov process we introduce the following notations and present the transition graph of the 3-out-of-6 system as a two-dimensional stochastic process Z (see Fig. 2). – j — the number of elements in the “DOWN” state, – λj = (n − j)α — the system failure intensity in its j-th state, B  (x) – β(x) = 1−B(x) — conditional repair density of elements, given elapsed repair time is x, – ˜b(s) — Laplace transform (LT) of the p.d.f. b(t), ∞ – b = (1 − B(x))dx — mean repair time of a failed element. 0

According to the Fig. 2, the system of Kolmogorov forward partial differential equations for process Z with absorbing state 3 in the scope 0 < x < t < ∞ has the following form

Modeling and Simulation of Reliability Function of a k-out-of-n:F System

275

Fig. 2. Transition graph of the 3-out-of-6 system with absorption





d π0 (t) = −λ0 π0 (t) + dt



t

π1 (t, x)β(x)dx, 0

∂ ∂ + π1 (t; x) = −(λ1 + β(x))π1 (t; x), ∂t ∂x   ∂ ∂ + π2 (t; x) = −(λ2 + β(x))π2 (t; x) + λ1 π1 (t; x) ∂t ∂x  t d π3 (t) = λ2 π2 (t; x)dx. dt 0

(1)

jointly with the initial π0 (0) = 1,

(2)

and the boundary conditions  π1 (t; 0) = λ0 π0 (t) +

t

π2 (t; x)β(x)dx, 0

π2 (t; 0) = 0.

(3)

Remark 1. Note that the second boundary condition follows from the fact that the process never occurs into the state 2 with the elapsed time x equal to zero since the process enters this state only as a result of a failure of another element and the transition from the state (1, x) with the same elapsed repair time. The proof of the following Theorem 1 is presented in [22] using the method of characteristics [24], so it will not be considered in this work. The objectives of the study are to build a simulation model and to compare its results with the analytical ones that were obtained earlier. ˜ Theorem 1. The Laplace Transforms (LT) R(s) of the reliability function R(t) of the 3-out-of-6:F system with Poisson failure flow and general repait time distribution is C3 (s) · s2 + C2 (s) · s + C1 (s) + C0 ˜ R(s) = , Δ

(4)

276

N. Ivanova

where   C3 (s) = λ1 1 + ˜b(s + λ1 ) − ˜b(s + λ2 ) − λ2 , C2 (s) = λ1 (1 − ˜b(s + λ2 ))(λ0 + λ1 ) − − λ2 (1 − ˜b(s + λ1 ))(λ0 + λ2 ) − λ1 λ2 (˜b(s + λ2 ) − ˜b(s + λ1 )), C1 (s) = λ2˜b(s + λ1 )(λ21 + λ0 λ2 ) − λ21˜b(s + λ2 )(λ0 + λ2 ), C0 = (λ1 − λ2 ) (λ0 (λ1 + λ2 ) + λ1 λ2 ) ,   Δ = (s + λ1 )(s + λ2 ) (s + λ0 )(λ1 (1 − ˜b(s + λ2 )) − λ2 ) + ˜b(s + λ1 )(sλ1 + λ0 λ2 )

Corollary 1. The expectation of the system lifetime has the form E[T ] =

1 (λ2 − λ1 )(1 − ˜b(λ1 ))  + + λ2 λ1 λ2 (1 − ˜b(λ1 )) − λ1 (1 − ˜b(λ2 )) +

λ − λ1 (1 + ˜b(λ1 ) − ˜b(λ2 ))  2 . λ0 λ2 (1 − ˜b(λ1 )) − λ1 (1 − ˜b(λ2 ))

˜ Proof. The proof of this corollary can be done by substitution s = 0 in R(s).

4

Simulation Results

In this section, we present the results of simulation of the 3-out-of-6: F system with one repair unit and general distributions of both life and repair time of its elements. To build a simulation model of the studied system, a programming language Python was chosen. Simulation modeling is conducted with the help of the discrete-event modeling method. It means that the system is modeled as a process, i.e., a sequence of operations being performed across entities. The constructed simulation model is showed as a process flowchart in Fig. 3. As a result ˆ of the algorithm, we get the empirical reliability function R(t), the mean system lifetime E[T ]. The goals of constructing a simulation model are to calculate the empirical reliability function of the 3-out-of-6: F system and its average lifetime for the usage of non-exponential distributions of lifetimes and repairs as well as to show the insensitivity of the system to the shape of its components’ repair time distributions. All simulation experiments were conducted with the total simulation time T = 104 . Moreover, for clarity, all the graphs are built on the scale of the meantime to failure of the system.

Modeling and Simulation of Reliability Function of a k-out-of-n:F System

277

Fig. 3. Flowchart of the discrete-event simulation model

In our experiments the following distributions with its characteristics are used for the repair time: – Gamma (G = G(k,θ))

√ c = 1/ k;

b = k · θ, – Gnedenko-Weibull (GW = GW (k,λ))   1 b=λ·Γ 1+ , k

 λ2 · Γ (1 + 2/k) − b2 ; c= b

– Pareto (P = P (k,xm )) k · xm , b= k−1

1 c= · k



k ; k−2

For the lifetime we used Exponential (Exp = Exp(α), a = α−1 ) and Gamma (with the same parameters as above) distributions.

278

N. Ivanova

In the first experiment, the Exponential distribution is used for both life with a parameter α and repair time with a parameter β with decreasing the average repair time of systems elements b. The average failure time a equals 1. The comparison of both analytical and simulation results is shown in Fig. 4. Here we use the average repair time of system elements b = 1, 0.5, 0.1. Note that the analytical results of the reliability function are obtained from the Theorem 1 using the inverse Laplace transform, the function of which is implemented in the numerically calculated program.

Fig. 4. Reliability function with exponential distribution for both life and repair time. Analytical and simulation results.

As can be seen in Fig. 4, curves of analytical calculation and simulation for reliability functions are the same for all cases over the entire period. With the decreasing value of b, the considered system has higher reliability and its mean lifetime among all the results of this example. The results of this experiment confirm the correctness of the simulation model. The values of the average lifetime E[T ] of the system for each case are shown in Table 1. These values of E[T ] are confirmed by the behavior of the curves in the graph above. In the second experiment, we show asymptotic insensitivity of system behavior to the repair time distribution. Here we use Exponential distribution for the elements’ lifetime and Gamma, Gnedenko-Weibull, and Pareto distributions for the repair time of the system’s elements (see Fig. 5). The parameters of all distributions are selected to fix the average repair time b and the coefficient of variation c. The average failure time a = 1. For the repair time distribution, we compare the following cases:

Modeling and Simulation of Reliability Function of a k-out-of-n:F System

279

Table 1. The meantime to failure E[T ] of the system with Exponential life and repair time distribution Exp(1), b = 1 Exp(2), b = 0.5 Exp(10), b = 0.1 Analytical 0.708171

0.816581

2.284287

Simulation 0.708333

0.816667

2.283334

1. the average repair time of the elements is b = 1, while its coefficient of variation c = 0.5 (Fig. 5 (a)), 2. the average repair time of the elements is b = 0.1 with the same coefficient of variation (Fig. 5 (b)). In this experiment, we also compare analytical and simulation results. Analytical curves were built with the same average time for life and repair but for this Exponential and Gamma distributions are used respectively. The graph shows that simulation curves are very close to the analytical ones. The differences in the two cases of the mean repair time are almost negligible (see Table 2). As we see, different cases of repair time distributions with the same parameters (average repair time of elements and coefficient of variation) show very close results for the empirical reliability function and mean system lifetime. This result confirms the asymptotic insensitivity to the form of the repair time distribution. Table 2. The meantime to failure E[T ] of the system with Exponential distribution for the lifetime and different distribution for the repair time G(k, θ) b=1

GW (k, λ) P (k, xm ) G(k, θ) - analytical

0.652441 0.649719

b = 0.1 2.595789 2.619817

0.648695 0.65221 2.60269

2.5989

In the next two experiments, we use only the simulation approach due to the impossibility of analytical calculations. In the following examples, we consider the distribution above for the repair time, for the life we use Gamma distribution. Here we compare the same cases of the average repair time with the different values of the coefficient of variation. In the next example for the repair time we use the distribution above with b = 1 and c = 0.5. For the lifetime we compare the different cases of the√coefficient of variation with the same mean time. Let’s a = k · θ = 1 and c = 1/ k = 0.5; 2 (Fig. 6).

280

N. Ivanova

Fig. 5. Reliability function with gamma distribution for lifetime and different distributions for repair time. Analytical and simulation results

Modeling and Simulation of Reliability Function of a k-out-of-n:F System

281

Fig. 6. Reliability function with gamma distribution for lifetime and different distributions for repair time

282

N. Ivanova

In this experiment we see how the coefficient of variation affects system behavior. With a small value c = 0.5 (Fig. 6 (a)), the system has a fairly high reliability with an average E[T ] = 1.5 (see Table 3). At a high value c = 2 (Fig. 6 (b)), the system is unreliable and has a very low average E[T ] = 0.07. Moreover, both graphs show insensitivity of the system to the shape of its components’ repair time distributions. Table 3. The meantime to failure E[T ] of the system with Gamma distribution for the lifetime and different distribution for the repair time (b = 1) G(k, θ) a) c = 0.5 1.51592 b) c = 2

GW (k, λ) P (k, xm ) 1.525796

1.512018

0.077912 0.073408

0.076536

In the final example, we consider the same cases as above but the average repair time is equaled 0.5. We see that the average lifetime of the system has almost doubled for the first case (see Table 4) compared to the previous example. For the bigger value of the coefficient of variation, we see almost the same result. The results of this experiment confirm the asymptotic insensitivity to the form of the repair time distribution. But note that the system is sensitive to the values of the coefficient of variation. That means that from the practical point of view of solving some tasks, it is important not only the mathematical expectation of the incoming parameters but also the value of variance or coefficient of variation (Fig. 7) . Table 4. The meantime to failure E[T ] of the system with Gamma distribution for the lifetime and different distribution for the repair time (b = 0.5) G(k, θ)

GW (k, λ) P (k, xm )

a) c = 0.5 3.406536 3.541664

4.419625

b) c = 2

0.070166

0.068732 0.071757

Modeling and Simulation of Reliability Function of a k-out-of-n:F System

283

Fig. 7. Reliability function with gamma distribution for lifetime and different distributions for repair time.

284

5

N. Ivanova

Conclusion

The problem of analytical calculation and simulation assessment of the reliability function for a k-out-of-n system has been considered. The analytical results of the reliability function are presented in terms of the Laplace transform. The simulation approach allowed us to demonstrate the asymptotic insensitivity of the considered system to the form of the repair time distribution of the system’s elements. The analysis of the obtained results shows that the results of the exact analytical calculation and simulation have a close agreement. In the future, the constructed simulation model can be used to calculate such characteristics as quasi-stationary probabilities, time-dependent system state probabilities and other important time and probabilistic metrics.

References 1. Trivedi, K.S.: Probability and Statistics with Reliability. Queuing and Computer Science Applications. Wiley, New York (2002) 2. Shepherd, D.K.: k-out-of-n Systems. Encyclopedia of Statistics in Quality and Reliability. Wiley, New York (2008) 3. Kozyrev, D.V., Phuong, N.D., Houankpo, H.G.C., Sokolov, A.: Reliability evaluation of a hexacopter-based flight module of a tethered unmanned high-altitude platform. In: Communications in Computer and Information Science, 1141 CCIS, pp. 646–656 (2019). https://doi.org/10.1007/978-3-030-36625-4 52 4. Perelomov, V.N., Myrova, L.O., Aminev, D.A., Kozyrev, D.V.: Efficiency enhancement of tethered high altitude communication platforms based on their hardwaresoftware unification. In: Vishnevskiy, V.M., Kozyrev, D.V. (eds.) DCCN 2018. CCIS, vol. 919, pp. 184–200. Springer, Cham (2018). https://doi.org/10.1007/9783-319-99447-5 16 5. Vishnevsky, V.M., Kozyrev, D.V., Rykov, V.V., Nguyen, Z.F.: Reliability modeling of an unmanned high-altitude module of a tethered telecommunication platform. Inf. Technol. Comput. Syst. 4 (2020). (in Russian)(in print) 6. Barlow, R., Klaus, H.: Computing k-out-of-n system reliability. IEEE Trans. Reliab. 30, 322–323 (1984). https://doi.org/10.1109/TR.1984.5221843 7. Sarje, A.K.: On the reliability computation of a k -out-of-n system. Microelectron. Reliab. 33(2), 267–269 (1993). https://doi.org/10.1016/0026-2714(93)90487-j 8. Rykov, V., Kozyrev, D., Zaripova, E.: Modeling and simulation of reliability function of a homogeneous hot double redundant repairable system. In: Proceedings of the 31st European Conference on Modelling and Simulation, ECMS2017, pp. 701–705 (2017). https://doi.org/10.7148/2017-0701 9. Rykov, V., Zaripova, E., Ivanova, N., Shorgin, S.: On sensitivity analysis of steady state probabilities of double redundant renewable system with Marshall-Olkin failure model. In: Vishnevskiy, V.M., Kozyrev, D.V. (eds.) DCCN 2018. CCIS, vol. 919, pp. 234–245. Springer, Cham (2018). https://doi.org/10.1007/978-3-31999447-5 20 10. Wu, J.S., Chen, R.J.: An algorithm for computing the reliability of a weighted k-out-of-n system. IEEE Trans. Reliab. 43(2), 327–328 (1994). https://doi.org/10. 1109/24.295016

Modeling and Simulation of Reliability Function of a k-out-of-n:F System

285

11. Li, X., You, Y., Fang, R.: On weighted k-out-of-n systems with statistically dependent component lifetimes. Probab. Eng. Inform. Sci. 30(4), 533–546 (2016). https://doi.org/10.1017/S0269964816000231 12. Harchol-Balter, M.: Performance Modeling and Design of Computer Systems: Queueing Theory in Action. Cambridge University Press, Cambridge (2013). https://doi.org/10.1017/CBO9781139226424 13. Cui, L., Frenkel, I., Lisnianski, A.: Stochastic Models in Reliability Engineering. CRC Press, Boca Raton (2020). https://doi.org/10.1201/9780429331527 14. Kuo, W., Zuo, M.J.: Consecutive k-out-of-n system. In: Optimal Reliability Modeling: Principles and Applications, pp. 328–383. Wiley, Hoboken, NJ, USA (2003) 15. Huang, J., Zuo, M., Wu, Y.: Generalized multi-state k-out-of-n: G systems. IEEE Trans. Reliab. 49, 105–11 (2000). https://doi.org/10.1109/24.855543 16. Goyal, N., Ram, M., Amoli, S., Suyal, A.: Sensitivity analysis of a three-unit series system under k-out-of-n redundancy. Int. J. Q. Reliab. Manag. 34(6), 770–784 (2017). https://doi.org/10.1108/IJQRM-07-2016-0106 17. El-Damcese, M., Shama, M.S.: Reliability analysis of a new k-out-of-n: G Model. World J. Model. Simul. 16(1), 3–17 (2020) 18. Kozyrev, D.V.: Analysis of asymptotic behavior of reliability properties of redundant systems under the fast recovery. Math. Inf. Sci. Phys. 3, 49–57 (2011). (in Russian). Bulletin of Peoples’ Friendship University of Russia 19. Rykov, V., Ngia, T.A.: On sensitivity of systems reliability characteristics to the shape of their elements life and repair time distributions. Vestnik PFUR. Ser. Math. Inform. Phys. 3, 65–77 (2014). (in Russian) 20. Efrosinin, D., Rykov, V., Vishnevskiy, V.: Sensitivity of reliability models to the shape of life and repair time distributions. In: 9th International Conference on Availability, Reliability and Security (ARES 2014), pp. 430–437. IEEE (2014). https://doi.org/10.1109/ARES.2014.65 21. Rykov, V.: On reliability of renewable systems. In: Vonta, I., Ram, M. (eds.) Reliability Engineering: Theory and Applications, pp. 173–196. CRC Press, Boca Raton (2018) 22. Rykov, V., Kozyrev, D., Filimonov, A., Ivanova, N.: On reliability function of a k-out-of-n system with general repair time distribution. Probab. Eng. Inform. Sci. 1–18 (2020). https://doi.org/10.1017/S0269964820000285 23. Cox, D.: The analysis of non-Markovian stochastic processes by the inclusion of supplementary variables. Math. Proc. Camb. Philos. Soc. 51(3), 433–441 (1955). https://doi.org/10.1017/S0305004100030437 24. Petrovsky I.G.: On Cauchy problem for a system of partial differential equations. In: Selected Works, Nauka, pp. 34–97 (1986). (in Russian)

Two Ways of Group Polling Method Application for Sensors Detecting in Unsynchronized Structured WSNs Ivan Tsitovich(B) Institute for Information Transmission Problems (Kharkevich Institute) RAS, Bolshoy Karetny per. 19, build.1, Moscow 127051, Russia [email protected]

Abstract. It is investigated the problem of detecting alarming sensors in large monitoring networks when there are objects where sensors at the object can activate simultaneously. We propose a generalization of the method of a sensor signal coding for an alarm signalization when a sensor signal cannot be synchronized in time. This method bases on the method of group polling for alarming sensors identification for a synchronized network and has similar characteristics of complexity but apply in mainly for detecting objects with active sensors. Our methods has more complicated structure than previous ones. For a network with very large object, we propose to use a sub-network of sensors at the object based on the Wi-Fi HaLow technology. For a network with middle size of objects, it is proposed the method with partly synchronized in time sensors at every object. Keywords: Wireless sensor network · Sensor for an alarm signalization · Group polling · Unsynchronized time · Heterogeneous sensors

1

Introduction

Studies of wireless sensors monitoring networks (WSNs) are widely conducted in different directions. One of the most interesting is the network organization which provides a quick identification of a sensor that has an urgent message for sending to the situation center (SC). The lack of common communication protocols that ensure the interests of all users suggests that networks are too diverse and can be fundamentally different in their characteristics. One such aspect covers in this paper, where it is suppose that probabilities of possible emergencies are very unlikely. The scope of the proposed method is low-power wide-area networks [1] oriented onto an environmental control. We examine the interaction of sensors with the SC via the WSN, where three nature sensor stages of activity are possible: Supported by grant AAAA-A19-119022590088-5. c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 286–298, 2020. https://doi.org/10.1007/978-3-030-66242-4_23

Two Ways of Group Polling Method Application in Structured WSN

287

I. the sensor transmits the information about its current state according to a given schedule sharing information with the SC; II. the sensor has detected an emergency and sends the alarm signal into the communication radio channel which is common for all sensors; III. the sensor transmits information about the emergency at the request of the SC through the dedicated communication channel. It is evident that for sensors in the first stage of activity we have a stable information flow such as the timetable of sensors activity is known. Number of sensors in the third stage of activity is small and their information flow is determined by the protocols of an emergency information. Therefore, sensors at the first and third stages generate a predictable traffic and are not under investigation in this paper by this reason. The main interest consists in constructing such sensors and organizing the WSN in such way that it is possible to ensure energy efficiency of sensors, reliability, and timeliness of communications in case of a large number of sensors connected to a common wireless channel when sensors are in the second stage of activity. The main feature is the following: most of the sensors does not send a signal of the second stage for the rest of their lives. Therefore, it is not energy efficient to maintain continuous communication with such sensors. If the SC detects a sensor as active then it switches the sensor into the third stage and the sensor becomes be inactive. Since the number of active sensors (sending alarm signal) at the same time is small, it is advisable to allocate a common radio channel for them and, therefore, it is the problem to identify such sensors based on their common signal in the channel such as sensor signals are mixed. In the paper [2], it was proposed the method of group polling for detecting of alarming sensors in a WSN network and properties of this method were investigated under the assumption of independent activity of the alarming sensors. It is supposed that the WSN is very large and contains thousands of sensors but all sensors synchronize in time their alarm signals. The last demand is difficult for its practical realization. However, proposed in [2] method ensures the fulfilment of a short time of an alarming sensors detection, i.e. if t is a number of sensors in the WSN then the detection time is O(log t). In the papers [3] and [4], it is proposed a generalization of this method onto a case of unsynchronized in time alarming signal sending. It is showed that the group polling method for alarming sensors identification is applicable at this case but its computation complexity is such that it is difficult to use the method for online detection or it is very expensive. In [6] it is proposed a more complex profiles of sensors which give us possibility to detect alarming sensors in time similar to a WSN with synchronized in time alarming signal sending. A principle scheme is on Fig. 1. The main property is that every emergency actives one sensor only.

288

I. Tsitovich

Fig. 1. WSN with homogeneous sensors as in [2]–[4],[6]. Two sensors detected emergencies and send the signals into the common channel that they have detected emergencies. The SC separates the obtained signals and identifies the sensors such as codes of the signals give this possibility.

However, it was supposed that the WSN consists with homogeneous sensors and only one of them is active in the case of an emergency at an object. Really we have WSNs where there are many objects with sensors for emergencies detection. If there is an emergency at the object then several sensors at this object begin to send the alarm signal for a real WSN. Such as a number of simultaneously sending sensors is a critical parameter for the stable detecting of active sensors (see [2]), it is necessary to investigate WSNs with heterogeneous sensors. Sense of sensor heterogeneity consists in their dependent activity for the sensors at the same object when the object has an emergency. This problem is investigated in [5] where it is supposed that all sensors at the object are active in the case of an emergency at this object. The motivation of such approach lies in the fact that the analysis of the data from all sensors makes the possibility of more accurately characterize of the emergency. If it is transferred the data from inactive sensors then it only leads to additional traffic in the communication channels and can be considered as an insignificant increase in the spending by the emergency detection. This assumption is valid only in the case when number of sensors at the object is small (this restriction was introduced in [5]). Now we suppose more real situation when a number of sensors at the object can be large: a few tens or even thousands.

Two Ways of Group Polling Method Application in Structured WSN

289

The formulation of the problem is presented in Sect. 2. In Sect. 3 it is described the algorithm of WSN output signal modeling when alarming sensors begin their signals in random time moments and take into account digitization in time of the output signal. In the next section, we present two way of active sensors communications with the SC in a structured WSN.

2

Setting of the Problem

For the mathematical model description, we follow the notations from [5]. The WSN consists of B objects, such that nj sensors are mounted at the jth object, j = 1, . . . , B. We assume that the number B is relatively large and nj  B for all j. Thus, we have in the WSN t=

B 

nj

j=1

sensors and develop the polling strategy aimed at the fastest identification of objects j1 , . . . , jr , whose sensors are ready for data transmission, and corresponding sensors (r is a number of simultaneous objects with dangers and is unknown). Let T be the average time of active sensors detection and λ be the intensity of Poisson process of disasters appearing on objects. Then the average value of r is λBT , and since the T is small, λ is extremely small, the value r is just as small. The objects with numbers j1 , . . . , jr are named as active objects and, therefore, it is necessary to find the set S o = {j1 , . . . , jr }. It was supposed in [5] that the data from all sensors at the object are received in the case of emergency at this object. This assumption is valid only in the case when nj is small (this restriction was introduced in [5]). Such as we suppose now that nj can be large we need to find alarming sensors also. Such sensors we name active ones. Their set is denoted by S s = {i1 , . . . , is }. Therefore, we have a more complicate problem than in [5]. In this problem, we assume that the emergency probability at the jth object pj is unknown but is relatively small: pj ≤ p where p is the predetermined probability, which is similar to the quantity p = st from [6]. Now we suppose that p = Bs and s ≤ 5. We assume that zj sensors are simultaneously activated at the jth object in the presence of the emergency, so that zj is a discrete random value distributed on the set {1, . . . , nj }. Therefore we have the set Sj = {ij1 , . . . , ijzj }

290

I. Tsitovich

of active sensors at the jth object and the set S s = ∪j∈S o Sj of all active sensors in the WSN. The distribution of zj depends of the object, the reasons of emergencies, the positions of sensors, etc. These parameters are either unknown or difficult to take into account. However, we assume that the probability of the activation more than one sensor at one object is relatively high. For example, if it is supposed that any sensor can be active with a conditional probability paj independently of another sensors at the object when the object is active one then it is natural to suppose that (1) paj  p. In contrast with [5] when all sensors begin to send their signal simultaneously, now they start to send signals separately. Let ˆj1 , . . . , ˆjsˆo be detected emergency object numbers, sˆo be the number of identified emergencies as in [5] and additionally ˆi1 , . . . , ˆisˆs be detected active sensor numbers and sˆo be the number of detected sensors. The quality of algorithm characterizes by the probability of correct identification of emergencies. Let Sˆo = {ˆj1 , . . . , ˆjsˆo } then P1 is the probability of the emergency object missing, i.e. P1 = P(S o  Sˆo ), and P2 is the probability of the active sensor missing, i.e. P2 = P(S s  Sˆs ). We calculate the probabilities under the assumption that the uniform distribution is determined in the admissible domain S.

3

Profiles for Signals of Active Sensors

Now profiles of sensors are a combination of profiles from [5] and [6]. Every sensor has the unique code in [2] as a sensor at the object o = (o1 , . . . , oMo ), and for the jth object its code is denoted by oj . Coordinates of the jth code have the values 1 or 0. For creating the codes we construct the Boolean matrix A = (ai , i = 1, . . . , B), where aji are independent random numbers 0 or 1 with a proper probability p0 for 1 in the matrix. The value p0 will be specified by the formula (6). Also the sensor at the jth object has the unique code s = (s1 , . . . , sMj ) where Mj depend on nj . We propose several ways of such codes constructing in dependent of Mj and a type of sensors communication. The total code of the jth object’s sensor is a = (o1 , . . . , oMo , s1 , . . . , sMj ). This code gives us the possibility to determine the number of sensor’s objects and its number at this object. The code ai generates a profile for a signal of the ith sensor when this sensor is active by the following way (see [6]). The profile consists of two part; every part has three portions. Let us begin with the first part. Let us suppose that the i-th sensors begins to be active at time ui . On the first portion the sensor is passive, i.e. ai (u) = 0, if u < ui .

(2)

Two Ways of Group Polling Method Application in Structured WSN

291

On the second portion the sensor is sending a special signal ai (u) = 1, if ui ≤ u < ui + ΔL,

(3)

where L is one of parameters for the profile. This is a new element in the profile in contrast with [3]. On the third portion we followed in general to the profile from [3] by the following ⎧ 1, if a0i = 0 for ui + ΔL ≤ u < ui + Δ(L + 1) and ⎪ ⎪ ⎪0 ⎪ for ui + (L + 1)Δ ≤ u < ui + (L + k + 1)Δ, ⎪ ⎪ ⎪ 1, ⎪ if a0i = 1 for ui + ΔL ≤ u < ui + Δ(L + k) ⎨ j if aji = aj−1 for the next time interval kΔ, ai (u) = ai , (4) i ⎪ j−1 j j−1 ⎪ , if a =  a for the next time interval Δ and a ⎪ i i i ⎪ ⎪ ⎪ ⎪ for the next time interval (k + 1)Δ, aji ⎪ ⎩ and so on, where k, k > 1, is a number of repeating of code symbols aji and is a parameter of the profile. It is proposed in [6] k = 3. Therefore, the length of the third portion depends on the vector ai and is denoted by Ni Δ. Under the conditions of the vector ai constructing Ni is a random value with the mean k + 4p0 (1 − p0 ). On the second part the first portion of the profile is as for the first part but has a random length v with the exponential distribution with a parameter λ > 0. This parameter is a common parameter for all profiles. We add this element in the profile by the same reason as it is used in aloha systems for minimizing conflicts. The resulting output continuous signal is dropped onto short time intervals with the length Δ; as a result, the continuous function f (u) drops onto the group of observations (f1 , f2 . . . ), that can be 0, 1, or nil where nil means that the output signal cannot be interpreted correctly. We have fj = 0 if in the jth time interval of digitation f (u) ≡ 0, fj = 1 if f (u) ≡ 1 in the interval. When the function f (u) at the interval changes its value (from 0 to 1, or 1 to 0), i.e. ∃u1 , u2 : f (u1 ) = f (u2 ), we cannot interpret the received signal correctly. This situation is a conflict and we should mark such signals as nil. Thus, for the jth Δ-interval ⎧ ⎨ 1, if f (u) ≡ 1, 0, if f (u) ≡ 0, fj = (5) ⎩ nil, if ∃u1 , u2 : f (u1 ) = f (u2 ). By the same way we construct from (2)–(4) discrete values a ˆi (j) that can be also 0, 1 or nil (i is the number of the sensor and j is the number of the corresponding time interval). Then, the result of an output signal for the jth interval a1 (j) ∧ x1 )∨, . . . , ∨(ˆ at (j) ∧ xt ), fj = (ˆ providing that 1 ∨ nil ≡ 1 and 0 ∨ nil ≡ nil.

292

I. Tsitovich

We assume that data transmission errors are possible in the network. This means that the value fj is known with a certain error. Therefore, results 0 or 1 of fj can be transformed in accordance with the matrix   1 − β0 , β0 W= β1 , 1 − β1 and we get the vector of observation g = (g1 , g2 , . . . ). If fj = nil then gj equals 0 or 1 with probability 0.5 and, therefore, the observations fj = nil cannot help for an alarming sensor detection. Therefore, we lose a part of information in contrast with the case from [2] and need to have longer sensors codes for an alarming sensor identification with the same quality. For minimizing a part of uninformative observation we repeat signal of a sensor k times and send additionally signals by the way as in (4) when the sensor changes his signal. Therefore, in mean we have k informative signal per 4p0 (1 − p0 ) uninformative ones. By this reason, for optimization a capacity of the common channel we use p0 such as 2 + k − 4p0 − (2 + k)2 − −16(1 + k)p0 (1 − p0 ) 0 p = (6) 4 − 8p0 for p0 < 0.5 and p0 = 0.5 for p0 = 0.5, where

1 s0 2 − β0 p0 = 1 − 1 − β0 − β1 and s0 is supposing number of active sensors.

4

Two Possible Ways of Group Polling Method Application for Sensors Detecting in Unsynchronized Structured WSNs

It is followed from (1) that the proposed in [6] group polling method is not applicable for coding sensors at an object if the object is relatively large, for example nj > 5. For these cases, we propose two different methods of communication sensors with the situation center. If objects of the WSN are little then we can use the method from [6] applied for objects detection. All sensors on the detected object consider as active ones. This method is effective if Ezj = O(nj ). Group Polling Method Application for WSNs with medium-sized objects (up to a hundred sensors) and large objects (a few hundred or thousands of sensors) are given further in this section.

Two Ways of Group Polling Method Application in Structured WSN

4.1

293

Structured WSN with Medium-Sized Objects

If nj < 100 we propose binary orthogonal code design with sharing access time for sensors at the jth object. It means the following. All sensors at the object are synchronized in time. This means that a sensor starts to send signal in fixed times and the sequence of possible start times is common for all sensors at the object. In contrast with a synchronized in time WSN [2,5] we have no large number of sensors and it is technically feasible requirement. A principle scheme is represented on Fig. 2.

Fig. 2. WSN with middle size of objects. All sensors at the object send synchronized signals simultaneously

All sensors have the same part of the code that corresponds to the object and have different codes of the part that corresponds to the sensor. The length of the last part of the code is 3nj . Every sensor has its number in the objects 0, . . . , nj − 1; let, for example, it is i. Then si = (s1 , . . . , s3nj ) has three 1 in positions 3i, 3i + 1, and 3i + 2 and 0 in different positions. The transformation of codes si into the sensor signal differs from (4). This part of the signal is the following ⎧ ⎨ 0 for 0 ≤ u < 3iΔ, ai (u) = 1 for 3iΔ ≤ u < ui + 3(i + 1)Δ, (7) ⎩ 0 for 3(i + 1)Δ ≤ u < 3nj Δ. It is followed from (7) and (5) that is case of the unmistakable signal transmission we detect 2 times symbol 1 in positions that corresponds to the ith

294

I. Tsitovich

sensor. Signals of other active sensors do not mix. We detect as active all sensors at the detected objects that the output signal g has at list one symbol 1 in the positions that correspond to the symbols 1 in the second part of the sensor’s signal a(u) in (7). Therefore,  nj P(S s  Sˆs |S o ⊆ Sˆo ) ≤ β12 j∈S o

and the conditional mean number of detected sensors has the following inequality  nj . E(sˆs |S o ⊆ Sˆo ) ≤ 3β0 j∈Sˆo

Using these formulas, we can estimate P2 if P1 is known:  nj + P1 . P2 ≤ β12 j∈S o

Therefore the problem of estimating the quality properties of active sensors detection is reduced to the problem of active objects detection that gives possibility to solve this problem as in [6] if the detection method applies to the active objects detection. Table 1. Increasing of the alarm signal length on B and nj when β0 = β1 = 0.01, c = 7.5, so0 = 2 B

nj

N

L

δ

1000

50 126 3546 5.6

5000

50 156 4387 4.6

5000 100 156 4387 9.2 10000 100 168 1260 8.5 25000 100 186 1395 7.7 100000 100 216 1620 6.6 100000 150 216 1620 9.9

The proposed method, in addition to synchronizing sensors, increases the length of the alarm signal. The Table 1 shows the results of the alarm signal length calculation by numbers of objects B and sensors at object nj when c = 7.5 (the parameter c in [6]), so0 = 2 (the number of active sensors), L = 18 (proposed values in [6]). Here N is the code of object length, L = 18 + cN (3 + 4p0 (1 − p0 )) is the mean value of the length of the first part of alarm signal generated by o, δ is the additional length of alarm signal generated by s as a percentage of L. It is followed from this data that for nj ≤ 100 or nj ≤ 100 for very large WSN the additional signal length and the time of active sensors identification grow less than 10%.

Two Ways of Group Polling Method Application in Structured WSN

4.2

295

Structured WSN with Large Objects

One of possible way of the problem solving consists in using the Wi-Fi HaLow technology [7], based on the IEEE 802.11ah standard. This way gives a possibility to organize a communication between sensors and the SC when an object has hundreds and even some thousands of sensors. The communication is set up via a Wi-Fi access point (AP). An AP uses for sending the alarm signal of any sensor at the object. If a sensor detects a danger then it sends to the AP a signal that it is ready to send an information to the SC. The AP send its profile signal in the common wireless radio channel to the SC. If the SC detects the AP then the AP sends an information from the active sensors at the object to the SC.

Fig. 3. WSN with large size of objects. All sensors near the fire are ready to send the signals but only the sensor 3xxx has such possibility. Its code the AP sends to the SC

296

I. Tsitovich

For energy loss minimizing, a sensor set-up a link with the AP when the sensor detects an emergency only. It is followed from (1) that a number of such sensors is relatively large. The IEEE 802.11ah standard identifies many channellevel mechanisms that allow you to use the channel more efficiently in scenarios where a large number of sensors are connected to a single Wi-Fi hotspot. One of the most important mechanisms is the Restricted Access Window (RAW), which allows the AP to divide the sensors into groups and each group to set aside a separate channel time interval during which only the sensors of a given group can transmit data. Together with the use of standard methods of random access to the channel, this mechanism significantly improves the efficiency of the network (see, for example, [8,9]). On Fig. 3 we illustrate the technology RAW for minimizing of collisions on the stage of authentication control for an active sensor. To minimize the number of active sensors in one time interval of RAW when an emergency occurs on an object, you need to portion the sensors into groups so that close sensors are into different groups. To ensure this property, you need to increase the number of groups g. However, in this case, the maximum time to connect the active sensor with the AP increases, as it is equal to gTc , where Tc is the duration of one time slot. For this aspect and other issues related to the organization of the sensor connection and the AP see [10–12]. Therefore the connection between an active sensor and the SC has two stage S ←→ AP and AP −→ SC and has a time T = T1 +T2 where T1 is the mean time of the connection between an active sensor and the AP and is investigated in [12] and T2 = LΔ where L is the length of object code. Almost P2 = P1 as we suppose that all active sensors can link to the AP. Therefore, the problem of active sensors detection is reduced to the problem of active objects detection and the last one can be solved by the method of [6]. For a structured WSN with a middle size of objects T = T3 + T2 where T3 = 3nj Δ. Therefore, if T1 nj ≥ 3Δ then it is more efficient to use the technology offered for larger objects than for medium-sized ones. Sensors at large objects have weaker requirements than other sensors. First, they must transmit and receive signals at relatively short distances of about a few kilometeres. Second, they only use local internal object codes, which represent only their numbers, and global sensor codes as elements of the WSN can be stored on the AP. Therefore,they can use simpler software and equipment and this may offset the cost of the AP. At medium-sized objects, sensors are integrated into the global network and must maintain local time synchronization.

Two Ways of Group Polling Method Application in Structured WSN

5

297

Conclusions

The main result consists in that for unsynchronized in time structured WSN it can be constructed a group polling with O(log t) time for alarming sensors detection. A time of sensors detection is similar to one for a WSN with independent activity of sensors as in [6]. It is proposed the method with partially synchronized sensors when objects in the WSN have less than 100 sensors and its effectiveness is investigated. For a WSN with large objects it is proposed the method of sensors detection that is based on the Wi-Fi HaLow technology. The computational complexity is growing no so much as in the case of [6] if a WSN structure is not taken into account. The decoding procedure for unsynchronized in time structured WSN can be similar to one for a WSN with independent activity of sensors as in [6]. For a WSN with heterogeneous objects and sensors the emergency probability pj can vary in a wide range. For this case preferably use codes with the signal profile length in dependence of pj and this problem will be investigated later.

References 1. Xiong, X., Zheng, K., Xu, R., Xiang, W., Chatzimisios, P.: Low power wide area machine-to-machine networks: key techniques and prototype. IEEE Commun. Mag. 53(9), 64–71 (2015) 2. Malikova, E.E., Tsitovich, I.I.: Group polling upon the independent activity of sensors in the monitoring networks. J. Commun. Technol. Electron. 56, 1556–1563 (2011) 3. Tsitovich, I.I., Shtokhov, A.N.: Method of group polling upon the independent activity of sensors in non-synchronized monitoring networks. Inform. Process. 16, 237–245 (2016) 4. Shtokhov, A., Tsitovich, I., Poryazov, S.: On the method of group polling upon the independent activity of sensors in unsynchronized wireless monitoring networks. Commun. Comput. Inform. Sci. 678, 266–278 (2016) 5. Malikova, E.E., Tsitovich, I.I.: Analysis of the efficiency of group polling upon the dependent activity of sensors in the monitoring networks. J. Commun. Technol. Electron. 56, 1552–1555 (2011) 6. Tsitovich, I.: Group polling method upon the independent activity of sensors in unsynchronized wireless monitoring networks. In: Vishnevskiy, V.M., Samouylov, K.E., Kozyrev, D.V. (eds.) DCCN 2019. CCIS, vol. 1141, pp. 436–448. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-36625-4 35 7. Khorov, E., Lyakhov, A., Krotov, A., Guschin, A.: A survey on IEEE 802.11 ah: an enabling networking technology for smart cities. Comput. Commun. 58, 53–69 (2015) 8. Tian, L., Famaey, J., Latr´e, S.: Evaluation of the IEEE 802.11ah restricted access window mechanism for dense IoT networks. In: 2016 IEEE 17th International Symposium on World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1–9. A/IEEE (2016)

298

I. Tsitovich

9. Khorov, E., Lyakhov, A., Yusupov, R.: Two-Slot based model of the IEEE 802.11 ah restricted access window with enabled transmissions crossing slot boundaries. In: 2018 IEEE 19th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1–9. IEEE (2018) 10. Khorov, E., Krotov, A., Lyakhov, A.: Modelling machine type communication in IEEE 802.11ah networks. In: Proceedings of the 2015 IEEE International Conference on Communication Workshop (ICCW), London, UK, 8–12 June 2015, pp. 1149–1154 (2015) 11. Kureev, A., Bankov, D., Khorov, E., Lyakhov, A.: Improving efficiency of heterogeneous Wi-Fi networks with joint usage of TIM segmentation and restricted access window. In: Proceedings of the 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Montreal, QC, Canada, 8–13 Oct 2017, pp. 1–5 (2017) 12. Bankov, D., Khorov, E., Lyakhov, A., et al.: What is the fastest way to connect stations to a Wi-Fi Ha Low Network? Sensors 18(9), 1–23 (2018). http://www.mdpi.com/1424-8220/18/9/2744

Regeneration Analysis of Non-Markovian System with Simultaneous Service and Speed Scaling Ruslana Nekrasova1,2(B) 1

2

Institite of Applied Mathematical Research KarRC RAS, Petrozavodsk 185000, Russia [email protected] Petrozavodsk State University, Petrozavodsk 185000, Russia

Abstract. We consider a multi-server queuing system under speed scaling policy, speed regimes are switched at arrival/departure instants according to the corresponding transition probability matrices. The model admit simultaneous service discipline: arriving customer occupies a random number of servers, which is simultaneously captured and then released after the service is finished. The paper concentrates on model with general distribution of service times. We present the regenerative structure of the model and rely on regenerative approach to construct confidence intervals for the steady-state system performance measures. As stability results were obtained for only for Markovian case, we rely on monotonicity properties to establish steady-state regime. Simulation results illustrate, that regenerative method provides more accurate estimation in comparison with bounds based on monotonicity properties. Obtained results are applicable in analysis of modern simultaneous service systems like wireless transmitters and laptops or parallel computing technologies. Keywords: Non work-conserving model · Simultaneous service · Speed scaling · Regenerative approach · Regenerative estimation

1

Introduction

Most of modern computing systems like distributed computing or high performance clusters contain simultaneous service technique. We deal with the model, where arrival simultaneously demands a random number of servers and join the queue, if resources are not available. Such a model admits idle servers, while the queue is not empty. Thus, service discipline is non work-conserving. That makes The study was carried out under state order to the Karelian Research Centre of the Russian Academy of Sciences (Institute of Applied Mathematical Research KRC RAS). The research is partly supported by Russian Foundation for Basic Research, projects 18-07-00147, 18-07-00156, 19-07-00303, 19-57-45022. c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 299–310, 2020. https://doi.org/10.1007/978-3-030-66242-4_24

300

R. Nekrasova

the analysis much more complicated (see, at instance [4,6]). Stability criterion for the Markovian system with simultaneous service policy was obtained in [13], authors based on a matrix-analytic approach. In more general case we have to rely on assumptions or simulation. Regenerative method is a powerful instrument in stochastic modelling and performance analysis. In recent work [12] regenerative confidence estimation was applied for mean queue size in M/M/2-type model with simultaneous service and speed scaling policy. Another application of regeneration theory for analysis of a simultaneous service model was presented in [3], where hypoexponential distribution of service time was considered. In this paper we construct m-server model with a general distribution of service time and speed scaling policy: both servers simultaneously switches speed regimes in arrival/departure instants. Under stability condition for dominating single server queueing model, we apply regenerative confidence estimation for original system with simultaneous service and illustrate confidence intervals for mean number of customers in the system and mean queue size, considering particular cases of Pareto and Weibull distributions of service time. The paper is organised as follows. In Sect. 2 we present a detailed description of a model under consideration. Section 3 is dedicated to regenerative approach for analysis of the system. We briefly discuss regenerative confidence estimation in discrete time and present the conditions of its applicability. Section 4 contains simulation results of regenerative confidence estimation for mean number of customers and mean queue size in simultaneous servers systems, considering Pareto or Weibull distribution of service time. Section 5 concludes the paper.

2

Description of a Model

We construct m-server queueing model with infinite buffer. Arrivals join the system at instants {tn ; n ≥ 1} according to renewal input with a rate λ. The n-th customer is characterized by a pair of random parameters: (Sn , Cn ) which define the amount of work and a number of required servers, respectively. Note, that current customer tries to capture Cn ∈ {1, . . . , m} servers simultaneously. If the resources are not available at instant tn , the customer joins a queue (organised according to FIFO discipline) until the service is possible. Then after completion of the required work amount Sn , all Cn servers are seized and released simultaneously. The sequences {Sn ; n ≥ 1} is independent and identically distributed (iid) and independent of an iid sequence {Cn ; n ≥ 1}. Denote the corresponding generic elements of such sequences by S and C, respectively. We consider general distribution of S and discrete distribution of C such, that P (C = k) := pk , k = 1, . . . , m, where pk are given probabilities. Other significant feature of the system under consideration is a speed scaling technique: the servers can process L distinct speeds with “rates” μ1 < · · · < μL , and speed switching simultaneously affects to both servers. Namely, if the servers

Regeneration Analysis of Non-Markovian System

301

work at rate μi (in the i-th mode) a work amount S is completed in S/μi time interval. We consider L modes, and assume, that speeds is altered only at arrival or departure epochs according to (corresponding) Markov chains with transition matrices ||aij ||, ||dij ||, i, j = 1, . . . , L. Namely, speed μi may be switched to speed μj at arrival or departure instant with probability aij or dij , respectively.

3

Regenerative Structure

Regenerative method is a strong instrument in stochastic analysis. In this section we present a detailed description of regeneration structure for a model under consideration. First, we define by ν(t) ∈ {0, 1, . . . , m} and Qn (t) ∈ {0, 1, . . . } the number of customers on service and the queue size at time instant t ≥ 0, respectively. Note, that ν(t) is an actual number of customers on service, which may not coincide with the number of busy servers. In particular, if Cn = k ≤ m (the n-th arrival occupies k servers), while and other (m − k) servers are stay idle at instant tn , then ν(tn ) = 1. The process, associated with total number of customers, is defined by X(t) = {ν(t) + Q(t); t ≥ 0}.

(1)

We additionally assume, that system has zero initial state (X(0) = 0) and construct the following sequence: Tk = min{tn > Tk−1 : X(Tn− ) = 0}, n

k ≥ 1, T0 = 0.

(2)

Namely, {Tk , k ≥ 1} indicates the instants, when arrival joins totally empty system: ν(Tk ) = Q(Tk ) ≡ 0. The system at instants Tk starts over in stochastic sense or regenerates. Random segments (cycles) {X(t); Tk−1 ≤ t < Tk }, k ≥ 1 of a process X are iid, and {X(t); , t ≥ 0} is called a regenerative process [1]. Note, that the sequence of regeneration cycles lengths is iid Tk − Tk−1 =

st T

and denote the generic length by T . If the mean cycle length ET is finite, the process {X(t), t ≥ 0} is called positive recurrent [9,14]. In general, positive recurrence also includes the condition for the first cycle: (3) T1 < ∞, which automatically holds, since the process was considered without delay, X(0) = 0 (the first cycle is stochastically equal to a generic one).

302

R. Nekrasova

If the condition ET < ∞ holds, then the regenerative method is applicable. Then we construct “time average” value of the process X at [0, t] as 1 r(t) = t



t

X(u)du,

(4)

0

The following limit (if exists) lim r(t) = r,

(5)

t→∞

is a steady-state performance measure (mean number of customers in the system). Conditions of existence for the limit 5 are rather simple. Define the iid sequence of accumulated values over regeneration cycles as  Zn =

Tn

Tn−1

If process X is positive reccurent and 1 t



t

n ≥ 1.

X(u)du, T 0

(6)

|X(u)|du < ∞, then

X(u)du →

0

EZ . ET

(7)

More detailed description of regeneration approach is well-presented in [1,8–10]. 3.1

Regenerative Estimation in Discrete Time

In this section we discuss regenerative method of confidence estimation, defining the basic processes in discrete time scale. Remind {tn , n ≥ 0} the sequence on arrival instants in the system under consideration. Denote by τn = tn − tn−1 ,

n≥1

iid inter-arrival times with a generic element τ . Next we construct the discrete analogue of the process X as follows: {Xn := X(t− n ), n ≥ 0}. Note, that Xn is associated with the total number of customers in the system just before the n-th arrival. (Define by νn , Qn the number of customers on service and queue length before the instant tn , respectively.) Next consider the sequence of regeneration points βk = min{n > βk−1 : Xn = 0}, n

k ≥ 1, β0 = 0.

(8)

Namely, {βk , k ≥ 1} indicates actual numbers of customers, that arrive into totally empty system: Xβk = 0. Note, that regeneration instants, defined in continuous and discrete time, are related as Tn = tβn .

Regeneration Analysis of Non-Markovian System

303

Next we define the sequence of iid regeneration cycles length discrete time (with a generic length α) by αn = βn − βn−1 ,

n≥1

(9)

and iid accumulated numbers of customers over each regeneration cycle by 

(βn )−1

Yn =

n ≥ 1.

Xk ,

k=β(n−1)

Note, that mean cycle lengths in both time scales are connected via Wald’s identity as ET = EαEτ. Thus, if Eτ < ∞, the conditions ET < ∞ and Eα < ∞ are equivalent and imply the positive recurrence of regenerative process {Xn }. Hence, if Eα < ∞ (10) the following limit exists: n Yk EY rn := nk=1 =: r, → Eα α k=1 k

n → ∞,

(11)

where Y is a generic element of a sequence {Yn , n ≥ 1}. Note, that rn coincides with an average number of customers in a system within interval [0, tβn ): βn 1  Xk . (12) rn = βn k=1

Actually, the result (11) means, that with a growth of cycle number, time average value of regeneration process converges to the ratio of mean cumulative value over cycle to mean cycle length. Namely, in case of positive recurrence, the behavior of regenerative process could be described by its cycle characteristics. By other significant result from regeneration theory [5], we obtain, that if α is aperiodic, the following weak convergence holds Xi ⇒ X (S) ,

i → ∞,

(13)

where X (S) is a stationary analogue of regenerative process X. From (13), we easily obtain (14) lim rn = EX (S) . n→∞

By Proposition 4.1 from [2] the estimator rn satisfies the following Central Limit Theorem  √  n rn − r ⇒ N(0, σ 2 ),

n → ∞,

(15)

304

R. Nekrasova

where σ2 =

E[Y − rα]2  2 . Eα

Hence, if limits (11) and (13) exist, then weak convergence (15) holds and implies the following 100(1 − γ)% confident interval:  (16) EX (S) ∈ rn − Δn , rn + Δn , with accuracy zγ σ n Δn = √ . n Note, that γ is a given reliability and σ 2n

n2 = n−1

n



Yi − rn αi  n 2 i=1 αi

i=1

2 .

(The value zγ defines (1 − γ/2)-quantile of the standard normal law.) 3.2

Application for Speed Scaling System

A point estimator rn coincides with mean average, which could be obtained without regenerative approach. Our goal is to apply regenerative method (RM) to build more informative interval estimator (16) for mean number of customers in considered system with speed scaling policy and simultaneous service. In this section we present the conditions for applicability of regeneration confidence estimation. First, we construct an auxiliary infinite buffer queueing system G/G/1 as follows: the same renewal stream with a rate λ as in original system with speed scaling, and service times are iid and stochastically equivalent to S/μ1 (time, demanded to serve a work amount S on the “slowest” regime in original system). By monotonicity properties [11] such a new system dominates the original system in a sense of load. Thus, its stability implies the stability of considered system with speed scaling. Remind generic inter-arrival time τ defined by and assume, that the following conditions hold ρ := λES/μ1 < 1,

P τ > S/μ1 > 0.

(17) (18)

Note, that Eτ = 1/λ and ρ defines a load coefficient in dominating queuing system. Remind considered zero initial state in original system: X0 = 0. Under condition ρ < 1 the dominating system is stable. Hence, we obtain the stability of original model, which also yields, that the process {Xn } is stochastically bounded. Then basing on results from regeneration theory and under (18) we

Regeneration Analysis of Non-Markovian System

305

derive the positive recurrence: Eα < ∞, where α is a generic regenerative cycle length, defined in (9) (see [9] for details). The condition (18) also implies, that with a positive probability there exist a regeneration cycle based the only arrival (P (α = 1) > 0), which means that α is aperiodic. Thus, (17)–(18) allow to apply RM for confident estimation of mean number of customers.

4

Simulation

In this section we present simulation results for the particular case of M/G/2type system with simultaneous service and speed scaling for a few distributions of S under conditions (17)–(18). We define speed scaling transition matrices, associated with arrival and departure instants by

1−aa 1 0 , ||dij || = , (19) ||aij || = 0 1 d1−d respectively. Our goal is to build confident intervals for the mean number of customers in the system EX (S) and mean queue size EQ(S) , where Q(S) is a stationary analogue of the queue process {Qn }. In Poisson input case the condition P (τ > S/μ1 ) > 0 automatically holds and EX (S) is bounded above by the mean number of customers in dominating system M/G/1 (denoted by EL). The value EL is obtained by Pollaczek-Khinchine formula [7] as ρ2 + λ2 DS/μ21 . (20) EL = ρ + 2(1 − ρ) while the mean queue (upper bound of Q(S) ) is obtained by EN =

ρ2 + λ2 DS/μ21 . 2(1 − ρ)

(21)

Note, that the process Q regenerates at the same instants as original process X. Thus, conditions (17)–(18) allow to construct the confident interval af follows: (Q) (Q)  zγ σ n zγ σ n EQ(S) ∈ qn − √ , qn + √ , n n

where βn 1  Qk , βn k=1  n2 n Y (Q) − q α 2 1/2 n i i i=1 = ,  n 2 n−1 αi

qn = σ n(Q)

i=1



(βn )−1

Yn(Q) =

k=β(n−1)

Qk ,

n ≥ 1.

(22)

306

4.1

R. Nekrasova

Pareto Service

First we consider Pareto distribution of S with a scale parameter fixed and equal to 1 and shape parameter denoted by K. Thus, P (S ≤ x) = 1 − x−K ,

x ≥ 1,

(23)

K . (K − 1)2 (K − 2)

(24)

and corresponding characteristics are defined by ES =

K , K−1

DS =

Note, that in this case dominating queuing system M/G/1 has Pareto distribution of service time with a scale parameter 1/μ1 and shape parameter K, while load coefficient is defined by ρ=

λK . μ1 (K − 1)

(25)

We explored the system behavior, considering one of three combinations of speed scaling rates (μ1 , μ2 ). For the “light” speed scaling we considered (μ1 , μ2 ) = (0.9, 1.1), for the “midium” speed scaling we fixed (μ1 , μ2 ) = (0.7, 1.3) and finally we simulated the system with a “hard” speed scaling, assuming (μ1 , μ2 ) = (0.5, 1.5). We also varied the value of ρ and illustrate the dynamics of total process X in case of “light”, “medium” and “hard” load of dominating system with corresponding load coefficients ρ = 0.45, ρ = 0.70, ρ = 0.92. (Note, that in all considered cases we fixed K = 3, which implies ES = 1.5, and varied λ to obtain the appropriate value of ρ.) The results, related to confidence estimation of EX (S) in M/P areto/2-type system with speed scaling and simultaneous service are presented in Table 1. Note, that all the experiments were done for fixed probabilities a = 0.4, d = 0.6, p1 = 0.5, other results had shown that values of a, d, p1 do not seriously affect to the accuracy of obtained intervals. Table 1. Confidence estimation of mean number of customers in M/P areto/2-type speed scaling system, K = 3. Test ρ

λ

μ1 μ2 rn

n

EL

Δn

EL − rn

1

0.450 0.270 0.9 1.1 0.530 12497 0.695 0.015 0.166

2

0.450 0.210 0.7 1.3 0.413 13668 0.695 0.012 0.282

3

0.450 0.150 0.5 1.5 0.339 14526 0.695 0.010 0.357

4

0.700 0.420 0.9 1.1 0.989 8968

5

0.700 0.330 0.7 1.3 0.714 10520 1.789 0.026 1.075

6

0.700 0.233 0.5 1.5 0.542 11949 1.789 0.015 1.247

7

0.920 0.552 0.9 1.1 1.609 6182

7.973 0.115 6.364

8

0.920 0.429 0.7 1.3 1.053 8186

7.973 0.046 6.921

9

0.920 0.307 0.5 1.5 0.796 9661

7.973 0.029 7.178

1.789 0.049 0.800

Regeneration Analysis of Non-Markovian System

307

0.5

1.0

rn Confidence interval EL

0.0

mean number of customers

1.5

The first three tests in Table 1 correspond to the system with “light” load (the load coefficient in dominating system ρ = 0.45). We based on 20 000 arrivals and obtained n = 12497 regenerations for the “light” speed scaling μ1 = 0.9, μ2 = 1.1. In this case the accuracy of regenerative estimation Δn ≈ 0.015, while the estimator, based on monotonicity properties is nearly in 10 times less accurate: EL − rn ≈ 0.166, where EL ≈ 0.695. The comparison of obtained estimators (test 1) is illustrated on Fig. 1.

0

2000

4000

6000

8000

10000

12000

number of cycles,n

Fig. 1. Confidence interval for mean number of customers in M/P areto/2-type model with light speed scaling, μ1 = 0.9, μ2 = 1.1, and light load ρ = 0.45.

With a growth of speed scaling rates the difference between dominating queueing system and original speed scaling system increases. Thus, for the case hard speed scaling (test 3) we obtained EL − rn = 0.357, while regenerative estimation is much more accurate: Δn = 0.010. Note, that the bigger values (μ1 , μ2 ) for a fixed ρ implies the decreasing of λ. The system becomes less loaded, which yields more regenerations, thus the confident interval in case 3 became a little thinner in comparison with the case 1. Tests 4–6 and 7–9 correspond to “medium” and “heavy” load, respectively. Smaller values of μ1 force the difference in load between dominating and original systems, and estimation rn by EL becomes less accurate. This fact is easily explained by (20). The increasing of such a difference is more notable in light load case. Meanwhile, varying of parameters μ1 , μ2 , ρ does not strongly affect to the accuracy of interval estimator, obtained by RM. In particular, for μ1 = 0.5, μ2 = 1.5, ρ = 0.92 (case 9), we obtained Δn ≈ 0.029, while EL−rn = 7.178. Such a result illustrates the advantages of regeneration estimation (at least in comparison with bounds build basing on monotonicity properties).

R. Nekrasova

0.5

1.0

qn Confidence interval EN EL

0.0

mean queue

1.5

308

0

2000

4000

6000

8000

10000

12000

number of cycles,n

Fig. 2. Confidence interval for mean queue in M/P areto/2-type model with light speed scaling, μ1 = 0.9, μ2 = 1.1, and light load ρ = 0.45.

The similar conclusions we obtain, estimating the mean queue size in corresponding models. The confident interval for EQ(S) in comparison with its upper bound EN are illustrated on Fig. 2. 4.2

Weibull Service

For Weibull distribution of S we define a scale parameter fixed and equal to 1 and shape parameter denoted by w. Thus, w

P (S ≤ x) = 1 − e−x ,

x ≥ 0.

(26)

and corresponding parameters are defined via Gamma-function as

1 , ES = Γ 1 + w

2 DS = Γ 1 + − (ES)2 . w

(27)

The dominating queuing system M/G/1 has also Weibull distribution of service time with shape parameter w, but scale parameter is equal to 1/μ1 . Its load coefficient is defined by ρ=

1 λ

. Γ 1+ μ1 w

(28)

Numerical results for regenerative estimation of mean number of customers in M/W eibull/2-type model (for fixed values w = 2, a = 0.4, d = 0.6, p1 = 0.5) are presented in Table 2.

Regeneration Analysis of Non-Markovian System

309

Table 2. Confidence estimation of mean number of customers in M/W eibull/2-type speed scaling system, w = 2. λ

μ1 μ2 rn

n

1

0.45

0.457 0.9 1.1 0.513 12633 0.684 0.014 0.171

2

0.450 0.254 0.5 1.5 0.333 14552 0.684 0.009 0.352

3

0.920 0.934 0.9 1.1 1.580 6015

7.656 0.083 6.076

4

0.920 0.519 0.5 1.5 0.770 9671

7.656 0.022 6.885

EL

Δn

EL − rn

0.2

0.4

0.6

0.8

Conf. int. for mean queue EN Conf. int. for mean number of customers EL

0.0

mean queue/mean number of customers

1.0

Test ρ

0

2000

4000

6000

8000

10000

12000

number of cycles,n

Fig. 3. Confidence intervals for mean number of customers and mean queue size in M/W eibull/2-type model with light speed scaling, μ1 = 0.9, μ2 = 1.1, and light load ρ = 0.45.

Similar to the case of Pareto service, we obtained, that regenerative confidence estimation provides more accurate results (in comparison with theoretical bound EL), specially with a growth of load coefficient. Confident intervals of EX (S) and EQ(S) for the system under light speed scaling policy and with ρ = 0.45 are illustrated on Fig. 3. Note, that the original model in such a configuration is the most close to dominating system and bounds EN and EL are the most accurate (in comparison with other tests, see Table 2). Moreover, that interval for mean queue (black solid lines) is thinner, than for (Q) mean number of customers. Thus, we obtained the variance relation σn < σn , is explained by simultaneous service.

5

Conclusion

We considered a general case of a system with simultaneous service under speed scaling policy. Such a model could be useful in simulation of modern parallel

310

R. Nekrasova

computing systems. As stability results were obtained only for models under exponential assumptions, we relied on stability condition for the dominating queuing system. Basing on regenerative approach, we applied confidence estimation for mean number of customers and mean queue size, considering 2-server model with Poisson input in stable regime. Numerical results, obtained for different configurations and particular cases of Pareto or Weibull distributions of service time, had shown the advantages of applied method in comparison with interval estimation, based on monotonicity properties.

References 1. Asmussen, S.: Applied Probability and Queues. Wiley, New York (2003) 2. Asmussen, S., Glynn, P.W.: Stochastic Simulation: Algorithms and Analysis. Springer-Verlag, New York (2007) 3. Afanaseva, L., Bashtova, E., Grishunina, S.: Stability analysis of a multi-server model with simultaneous service and a regenerative input flow. Methodol. Comput. Appl. Probab. 22, 1–17 (2019). https://doi.org/10.1007/s11009-019-09721-9 4. Brill, P., Green, L.: Queues in which customers receive simultaneous service from a random number of servers: a system point approach. Manag. Sci. 30(1), 51–68 (1984) 5. Crane, M.A., Lemoine, A.J.: An Introduction to the Regenerative Method for Simulation Analysis. Springer-Verlag, Berlin (1977) 6. Fletcher, G.Y., Perros, H., Stewart, W.: A queueing system where customers require a random number of servers simultaneously. Eur. J. Oper. Res. 23, 331–342 (1986) 7. Haigh, J.: Probability Models. Springer, London (2002) 8. Morozov, E.: The tightness in the ergodic analysis of regenerative queueing processes. Queueing Syst. 27, 179–203 (1997) 9. Morozov, E.: Weak regeneration in modeling of queueing processes. Queueing Syst. 46, 295–315 (2004) 10. Morozov, E., Delgado, R.: Stability analysis of regenerative queues. Autom. Remote control 70, 1977–1991 (2009) 11. Morozov, E., Rumyantsev, A., Peshkova, I.: Monotonicity and stochastic bounds for simultaneous service multi-server systems. In: 2016 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT) on Proceedings, pp. 294–297. IEEE, Moscow (2016) 12. Nekrasova, R., Rumyantsev, A.: Regenerative estimation of a simultaneous service multi-server system with speed scaling. In: Proceedings of the 26th Conference of Open Innovations Association FRUCT, pp. 346–351. Helsinki, Finland (2020) 13. Rumyantsev, A., Morozov, E.: Stability criterion of a multi-server model with simultaneous service. Ann. Oper. Res. 252(1), 29–39 (2015). https://doi.org/10. 1007/s10479-015-1917-2 14. Sigman, K., Wolff, R.W.: A review of regenerative processes. SIAM Rev. 35, 269– 288 (1993)

Integrated Tolerant Distributed Computing Network Oleg Brekhov(B) Moscow Aviation Institute (National Research University) (MAI), Volokolamskoye shosse, Moscow 125993, Russia [email protected]

Abstract. Distributed computer network (DCN) consists of computing modules (CM). Two analytical performance models of tolerant computing networks are described in this paper. The first model is itself based on two models: a model for evaluating performance depending on the number of serviceable CM and a performance model depending on the method of ensuring the tolerance of the computer network. This model assumes that a computing module can’t be restored. The second model assumes that during the life cycle of a tolerant DCN its CM can be in one of three possible states: non-functional, functional – working, and functional – controlled. It is also assumed that the CM can be restored. Keywords: Model · Analytical · Performance Distributed · Tolerant · Restoration work

1

· Computing network ·

Performance Model of the DCN with Non-restorable Computing Modules

The performance of a distributed computing network (DCN) can be determined in relation to various levels of functioning (commands, programs, tasks, and jobs). Here, the performance of the DCN is related to the level of task completion. The task can be completed when a certain event occurs for it and there is a free resource. The impact of task readiness can be taken into account when using the model of the CM functioning as a system with a dynamic change in the number of tasks. In this case, each task executed by the processor brings a certain number of tasks to the ready state out of the maximum tasks to be completed. The availability of a free resource undoubtedly depends on the distribution of tasks across the CM, where they should be performed. It is necessary to provide measures to ensure tolerance so that the degree of performance reduction is the lowest. We will limit ourselves to software tools. We will build an integrated analytical model of the performance of a tolerant DCN based on two models: a model for evaluating performance based on the number of serviceable CM, and a performance model based on the method of ensuring tolerance. c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 311–326, 2020. https://doi.org/10.1007/978-3-030-66242-4_25

312

1.1

O. Brekhov

Model of the Number of Virtual Computing Modules Depending on the Means of Ensuring Network Tolerance

During the life cycle of the DCN, CM may be in good or faulty condition. We will use a functional approach to control the state of CM using software tools. On this path, when using a diagnostic test, performing a single task requires one (d = 1) CM. In another implementation of module health monitoring, parallel execution of d, d ≥ 2, copies of one task for each copy requires its own module, i.e. d computing modules. To ensure CM control, CM must be distracted from performing basic functional tasks. The time required to detect and locate a fault, as well as to logically exclude a faulty module, depends significantly on the tools and methods used in this case. As a rule, this time is longer if the number of CM running copies of tasks at the same time is less. If you use d, d ≥ 2, copy tasks, program actions related to determining the health of modules are performed on another CM with minimal time spent on the controlled CM. When using a diagnostic test, control measures require time from both the controlled and controlling modules. In our model, without loss of generality, we will assume that the controlling activities spend the time resources of only one module. We will also assume that the activation of the functional control mechanism is not necessarily associated with the completion of each functional task. Denote pi,j (t) the probability that at time t with i + j functioning CM i CMs are in the state of performing functional tasks and j CMs are performing control functions. Next, our goal is to build a model of the DCN, which will allow us to determine the probabilities pi,j (t), i, j = 0, n. We assume that the DCN subsystem contains n serviceable CM. Let the operating time intervals and control time intervals be random variables with exponential distribution functions with intensities λi and μj , depending on i operating and j controlling CM, respectively. As a result of control measures with probability r, the fault of the computing module is fixed and the faulty module is excluded from the list of serviceable one with an additional probability (1 − r), the number of serviceable CM remains the same. Due to the exponential distribution functions of the duration of processes, the model of DCN operation in non-stationary mode is described by the following graph of states (see Fig. 1). 2 states, and there are no states (i, j) with an The graph contains Cn−d+3 index i < d − 1, since one task is required in the CM to perform in copies. Thus, the state (d − 1, j), j = 0, n − d + 1, corresponds to a situation when the CM does not perform functional tasks, but only performs controlling functions.

Integrated Tolerant Distributed Computing Network

313

Fig. 1. .

In accordance with the graph of States we have a system (1) of equations: pn,0 (t) = −λn pn,0 (t) + (1 − r)μ1 pn−1,1 (t); pn−j,j (t) = −(μj − λn−j )pn−j,j (t) + λn−j+1 pn−j+1,j−1 (t) + (1 − r)μj+1 pn−j−1,j+1 (t), j = 1, n − d; pd−1,n−d+1 (t) = −μn−d+1 pd−1,n−d+1 (t) + λd pd,n−d (t); pn−i,0 (t) = −λn−i pn−i,0 (t) + rμ1 pn−i,1 (t) + (1 − r)μ1 pn−i−1,1 (t), i = 1, n − d; pn−i−j,j (t) = −(μj + λn−i−j )pn−i−j,j (t) + λn−i−j+1 pn−i−j+1,j−1 (t) + (1 − r)μj+1 pn−i−j−1,j+1 (t) + rμj pn−i−j,j+1 (t), i = 1, n − d − 1, j = 1, n − i − d; pd−1,n−d−i+1 (t) = −μn−d−i+1 pd−1,n−i−d+1 (t) + λd pd,n−i−d (t) pd−1,0 (t)

+ rμn−d−i+2 pd−1,n−i−d+2 (t), i = 1, n − d; =rμ1 pd−1,1 (t);

(1)

314

O. Brekhov

Based on physical considerations, we believe that: pn,0 (t = 0) =1, pd−1,0 (t → ∞) = 0 for i, j ∈ {0, n}; pi,j (t = 0) =0, pi,j (t → ∞) = 0

(2)

The general solution of the system can be obtained by moving on to Laplace transformations and finding the inverse Laplace transform p{i,j} (s), or by numerical method directly of the system using the Mathcad package. However, for the case when the intensity parameters meet the condition, λi = λ and μi = μ, we find explicitly from the system (3): ⎡ ⎤  1 j ⎦ pi,n−i (s) = i−d+1 ⎣ (−1)j ai−d−2j bj (cj−1 i−d−j a + ci−d−j (a − λ)) λ (3) j=0 × pd−1,n−d+1 (s), i = d, n; where a = s + λ + μ, b = (1 − r)λμ. The obtained solutions make it possible to determine changes in the characteristics of the CM over time, depending on the method of ensuring tolerance, so the average number of DCN directly involved in the performance of functional tasks is equal to: n n−i   i jpi,j (t). ncp = (4) i=d

j=0

Since a single task requires d (d ≥ 1), CM, the number of CMs directly involved in performing functional tasks should be reduced by a factor of d, i.e. the number of virtual (actual) modules is equal to: ν=

ncp d

(5)

Table 1 and graphs on Fig. 2 show the average number of VMS engaged in performing functional tasks for the following parameter values: the average time for performing functional tasks, the average control time is equal to: 1 - when using a diagnostic test (d = 1), 0.2 - when performing two-copy tasks (d = 2), and 0.05 - when performing three-copy tasks (d = 3), the probability of CM failure and, the initial number of CM is n = 32. Figure 3 shows the graphs of changes in the number of virtual VMS depending on the life of the CM while maintaining the above parameters. Based on the calculations performed, we can offer an approximating formula for calculating the average number of virtual DCN:  n rt ν = 2 1− (6) d (1 + μ1 ) 1.1d (1 + μ1 ) which, if the condition is met, provides an accuracy of up to 5%. Note that at the time scale of sec. the value corresponds to the operating time of the aircraft for about 2.5 h.

Integrated Tolerant Distributed Computing Network Table 1. . ncp t = 0 t = 4000 t = 8000

d r

1 10−6 16

15.96

1 10−5 16

15.68

15.36

2 10−6 26.67 26.58

26.49

2 10−5 26.67 25.78

24.89

3 10−6 30.48 30.36

30.24

−5

3 10

30.48 29.31

Fig. 2. .

Fig. 3. .

15.92

28.14

315

316

O. Brekhov

1.2

DCN Performance Estimation Model

Let the DCN contain v of the same type of virtual CM. The functioning of the CM consists in performing the same type of tasks, and one task requires exactly one CM to complete it. Without generality restriction, we assume that the maximum number of tasks to be completed

is h, where h ≥ v. The completed k task initiates i tasks with the probability qi , j=2 qi = 1, i = 0, k, 2 ≤ k ≤ h, each of which starts running when there is a free VM. Let the runtime τB CM tasks be a random variable with an exponential distribution function p(τB < t) = 1 − e−γt with parameter γ. To evaluate the performance of the DCN used a variety of performance indexes. We will get a solution for the DCN subsystem, based on which various indexes of DCN performance are determined, in particular, the average number of tasks and the average time to complete tasks. The difficulty of the mathematical study of the transient behavior of the system, on the one hand, and interest in the characteristics of the system in conditions when the system operates long enough, on the other hand, lead to the requirement that the completion of tasks in the absence at this point in the system other tasks necessarily result in initiating one or more tasks. We assume that in this case, the

k probability of initiating a single task meets the condition q1 = q1 + q0 , q1 + j=2 qi = 1. Another condition that must be met: the number of existing tasks in the system cannot be more than h. In the model this is taken into account by replacing the probability qj+1 of transition to state h from state (h − j) to

k  probability qj+1 = l=j+1 ql . Due to the exponential distribution function of the duration of processes, the model of CM operation in stationary mode is described by the following system of equations: k−1 

qj (i + j − k)pi+j−k bi = ipi , j = 2, ν, pi+j−k = 0 for i + j − k ≤ 0

j=1 k−i−1  j=1 k−1 

(ν + i + j − k)pν+i+j−k bi + ν

i−1 

pv+j bk−i−j = νpn+i , i = 1, k − 2

(7)

j=0

pν+i+j bi = pν+k+i , i = −1, h − ν − k.

j=1

Where pi , i ≤ v is the stationary probability that the system has i-active VMS (initiated I tasks); pn+j , j = 1, h − v is the stationary probability that n VMS are active, and j tasks are in the waiting state (initiated v + j tasks), Qi = qi /q0

k and bj = l=k−j+1 Ql . It can be proved that for probabilities pl , l = 1, h the relation (8) is valid

Integrated Tolerant Distributed Computing Network

[ min(ν, l)pl = p1 ⎡ ⎣

l−1−

l−1 k−1



]



l−1−(k−1)i1 k−2



bi11 ×

i1 =0 ⎤

k−3 (k−j)ij j=1 2

l−1−

2 j=1 (k−1)ij k−3

i2 =0

l−1− i bkk−2 bk−1





bi22 ×

bi33

i3 =0





×





317



k−3

j=1 (k−j)ij

P i1 , i2 , . . . , ik−2 , l − 1 −

ik−2 =0

k−2 

 (k − j)ij

j=1

(8) The average number of active issues is:

hcp = ⎡ ⎣

×

h 

h−1 k−1

] [  i min(ν, l)pl = p1 ( b11 ×

l=1 l−1−

k−3 (k−j)ij j=1 2





h−1−(k−1)i1 k−2

i1 =0

⎤ ⎦

h−1−

i

bkk−2

ik−2 =0







h−1−

2 j=1 (k−1)ij k−3

bi22 ×

i2 =0



bi33 × . . .

i3 =0

k−3 (k−j)ij j=1 k−3





(1 + max(

ik−1 =0

ik−1 − ν + 1 ik−1 , 0))bk−1 ν

× P (i1 , i2 , . . . , ik−1 )),

(9) Based on the obtained solution, we find the average time to solve problems: Tcp =

1 hcp γ ν

(10)

In particular, if the number of initiated tasks is limited to no more than two for (K = 2), the average number of tasks activated in the DCN is equal to

hcp =

Qh2 − 1 + (Q2 − 1)

ν+1 h−ν +1 Q2 (h−ν)Q2 −(h−ν+1)Q2 h−ν ν Q −1



Qh−ν Qh−ν −1 2 2 ν Q2 −1

2

+

ν

Qi−1 2 i=1 i



(11)

which when Q2 = q2 /q0 = 1 can be approximated as: h + h−ν(h−ν+1) 2ν h cp = h−ν ν + 0.6 + ln(ν)

(12)

Figure 4 shows the values of the normalized average time γ for completing tasks with parameters: the maximum number of tasks is h = 128, the probability of initiation γ, the tasks correspond Q2 = 1, and the number of virtual VMS varies from 8 to 16. We see that even when switching from 16 CM to 15, the task execution time increases by 8.57%.

318

O. Brekhov

Fig. 4. .

1.3

An Integrated Model of the DCN

Combining the models developed above: the model of the number of virtual VMS depending on the means of ensuring tolerance and the model of the execution time of functions depending on the number of virtual VMS, we get an integrated model. In accordance with the results and formulas, graphs of changes in the execution time of functional tasks depending on the life of the system are given at Fig. 5 for the values of parameters: H = 128, Q2 = 1, k = 2, n = 32, λ = γ = 1.

Fig. 5. .

We see that the execution time of functional tasks is the minimum, i.e. the best, when using the diagnostic test (d = 1). The ranking of methods for ensuring tolerance at d = 1, 2, 3 based on the execution time of functional tasks is not complete, of course.

Integrated Tolerant Distributed Computing Network

2

319

Performance Model of the Tolerant DCN with Restorable Computing Modules

Here the main attention is paid to the definition of the functioning and development of models for the effectiveness of tolerant DCN (TDCN) with a variable number of TDCN and with a variable number of functional and service tasks. The variable number of TDCN is due to the fact that the CM can be in one of three possible states: not working, working-working, and working-controlled. It is also assumed that the CM can be restored. In turn, the CM can perform work and service tasks when it is in a working state. Performance of service tasks should be associated with ensuring the tolerance of computing systems. To ensure TDCN tolerance, a functional approach can be used, in which the state control of CM is implemented by software, using diagnostic testing or dcopy task execution. When using a diagnostic test, performing a single task requires one (d = 1) module. When performing d-copies of tasks, d-copies of the same task are executed in parallel, when each copy requires its own CM. In each of these cases, to ensure control, the CM must be distracted from performing functional tasks. When using a diagnostic test, control measures require time from the controlled and controlling CM. If you use a d-copy, task execution, program activities related to determining the health of modules are performed on another CM with minimal time spent on the controlled CM. Further, it is accepted that monitoring activities spend time resources of only one module. 2.1

Statement of the Problem

Initially, the TDCN system contains n serviceable TDCN. The time intervals of CM operation and control are random variables with exponential distribution functions with intensities and, depending on the number of operating i and controlling j TDCN, respectively. As a result of control measures with probability r, the CM is not working properly, and the non-working CM is excluded from the list of working, with an additional probability (1 − r) the number of working TDCN remains the same. The time interval for restoring a CM is a random variable with an exponential distribution function, with an intensity that depends on the number i of nonfunctioning TDCN. Due to the exponential distribution functions of the duration of processes, the model of TDCN is described by the following graph of States, see Fig. 6. The graph contains States, and there are no States (i, j) with an index, since d instances of a single task require d CM. Thus, the state (d − 1, j), corresponds to a situation when TDCN does not perform functional tasks, but only performs controlling functions. In accordance with the state graph, the TDCN behavior can be studied for non-stationary (transient) and stationary cases.

320

O. Brekhov

Fig. 6. .

2.2

System of Differential Equations for Studying the Transition Process of TDCN Behavior

Denote the probability that at time t with i + j functioning TDCN, i TDCN are in the state of performing functional tasks and j TDCN are performing control functions.

Integrated Tolerant Distributed Computing Network

321

The TDCN behavior is described by the system 13 of differential equations:  (t) = −γn Pn,0 (t) + (1 − r)μ1 Pn−1,1 (t) + γn−1 Pn−1,0 (t) Pn,0  (t) = −(μj + γn−j )Pn−j,j (t) + γn−j+1 Pn−j+1,j−1 (t) Pn−j,j

+ (1 − r)μj+1 Pn−j−1,j+1 (t) + γn−1 Pn−j−1,j (t),  Pd−1,n−d+1 (t)  Pn−i,0 (t)

j = 1, n − d = −μn−d+1 Pd−1,n−d+1 (t) + λd Pd,n−d (t); = −(λn−i + γn−i )Pn−i,0 (t) + rμ1 Pn−i,1 (t) + γn−i−1 Pn−i−1,0 (t) + (1 − r)μ1 Pn−i−1,1 (t), i = 1, n − d

 Pn−i−j,j (t)

= −(μj + λn−i−j + γn−i )Pn−i−j,j (t)

(13)

+ λn−i−j+1 Pn−i−j+1,j−1 (t) + rμj+1 Pn−i−j,j+1 (t) + γn−i−1 Pn−i−j−1,j (t) + (1 − r)μj+1 Pn−i−j−1,j+1 (t),  Pd−1,n−d−i+1 (t)

i = 1, n − d − j, j = 1, n − i − d; = −(μn−d−i+1 + γn−i )Pd−1,n−d−i+1 (t) + λd Pd,n−i−d (t) + rμn−i−d+2 Pd−1,n−i−d+2 (t),

 Pd−1,0 (t)

i = 1, n − d; =rμ1 Pd−1,1 (t);

Based on physical considerations, we believe that: Pn,0 (t = 0) = 1; i, j ∈ {0, n}; Pi,j (t = 0) = 0

(14)

The general solution of the system can be obtained by moving on to the Laplace transformations and finding the inverse Laplace transform. The obtained solutions of the system make it possible to determine changes in the characteristics of the TDCN over time, depending on the method of ensuring tolerance, so the average number of CM directly involved in the performance of functional tasks is equal to: ncp =

n n−i   i jpi,j (t). i=d

2.3

(15)

j=0

System of Ordinary Equations for Studying the Behavior of TDCN for the Stationary Case

Denote the probability that if there are i + j functioning CM, i CM are in the state of performing functional tasks and j CM perform controlling functions when time t → ∞ is tending.

322

O. Brekhov

We will determine the exact and approximate solution. Exact Solution To find the Pi,j probabilities, we obtain the following system of linear equations: Based on the state (d − 1, n − d + 1): 1 μn − d + 1Pd−1,n−d+1 λd 1 rμn−d+2−i = (μn − d + 1 + γn−i )Pd−1,n−d+1−i − Pd−1,n−d+2−i λd λd rμ1 = Pd−1,1 γd−1 1 = (μn−d+j + λd+j−1 )Pd+j−1,n−d+1−j λd+j (1 − r)μn−d+2−j − Pd+j−2,n−d+2−j λd+j γn−1 − Pd+j−2,n−d+1−j , j = 1, n − d λd+j (μn−i−d−j + λd+j−1 + γn−i ) = Pd+j−1,n−i−d−j+1 λd+j (1 − r)μn−i−d−j+2 − Pd+j−2,n−i−d−j+2 λd+j rμn−i−d−j+2 γn−i−1 − Pd+j−1,n−i−d−j+2 − Pd+j−2,n−i−d−j+1 , λd+j λd+j

Pd,n−d = Pd,n−d−i Pd−1,0 Pd+j,n−d−j

Pd+j,n−i−d−j

j = 1, n − d − i, i = 1, n − d − j (16) Assuming the probabilities Pd−1,0 , . . . , Pd−1,nd+1 as n − d base probabilities, the structure of this system of equations allows us to express all other probabilities in terms of these probabilities. However, note that the equation for the state (d − 1, 1) follows: Pd,0 =

μ1 + γn−d rμ2 Pd−1,1 − Pd−1,2 λd λd

(17)

and the equation for the state (d − 1, 0) follows: Pd,0 =

rμ1 (1 − r)μ1 γn−d−1 Pd,1 + Pd−1,1 + Pd−1,0 λd + γn−d λd + γn−d λd + γn−d

(18)

in this case, the probability Pd,1 , included in the last equation, is determined using the base probabilities Pd−1,1 and Pd−1,2 . Therefore, using the two above equations for Pd,0 , one of the base probabilities can be expressed in terms of other n − d + 1 base probabilities, which reduces the number of unknown base probabilities to n − d + 1. Similarly, for probabilities there are also additional

Integrated Tolerant Distributed Computing Network

323

equations (j = 0, n − d − 1). 1 (1 − r)μ1 γd+j−1 (rμ1 )Pd,1 + Pd+j,1 + Pd+j−1,0 λd+j + γd+j λd+j + γd+j λd+j + γd+j (19) which reduces the number of unknown base probabilities to 1 base probability, i.e. all the required probabilities of the system can be expressed in terms of a single base probability, for example, in Pd−1,1 . Note that the equations obtained by for the state (n, 0): Pd+j,0 =

Pn,0 =

(1 − r)μ1 γn−1 Pn−1,1 − Pn−1,0 λn λn

(20)

and for the state (n − 1, 1): Pn,0 =

λn−1 + μ1 (1 − r)μ1 γn−1 Pn−1,1 + Pn−2,2 + Pn−2,1 λn λn λn

(21)

it is not possible to find the remaining base probability, since they are linearly independent equations. By using this method to express all the probabilities in terms of a single base probability and substituting them into the normalization equation, we find the base probability and thus all the probabilities. Approximate Solution You can see from the results of this and other examples that the probabilities of being in the States of the first two upper levels of the graph are the most significant. Let’s create a system of equations for a graph whose States are bounded by the first two upper levels, see Fig. 7.

Fig. 7. .

324

O. Brekhov

The TDCN behavior is described by the following system of differential equations (22):  (t) = −λn Pn,0 (t) + (1 − r)μ1 Pn−1,1 (t) + γ1 Pn−1,0 (t); Pn,0  (t) = −(μj + λn−j )Pn−j,j (t) + λn−j+1 Pn−j+1,j−1 (t) Pn−j,j

+ (1 − r)μj+1 Pn−j−1,j+1 (t) + γ1 Pn−j−1,j (t), j = 1, n − d;  Pd−1,n−d+1 (t) = −μn−d+1 Pd−1,n−d+1 (t) + λd Pd,n−d (t);  (t) = −(λn−1 + γ1 )Pn−1,0 (t) + rμ1 Pn−1,1 (t) + μ1 Pn−2,1 (t) Pn−1,0  (t) Pn−j−1,j

(22)

= −(μj + λn−i−j + γ1 )Pn−j−1,j (t) + λn−j Pn−j,j−1 (t) + rμj+1 Pn−j−1,j+1 (t) + μj+1 Pn−j−2,j+1 (t), j = 1, n − d − 1;

 Pd−1,n−d (t)

= −(μn−d + γ1 )Pd−1,n−d (t) + λd Pd,n−d−1 (t) + rμn−d+1 Pd−1,n−d+1 (t).

Based on physical considerations, we believe that: Pn,0 (t = 0) = 1; i, j ∈ {0, n}; Pi,j (t = 0) = 0

(23)

The general solution of the system can be obtained by moving on to the Laplace transformations and finding the inverse Laplace transform. To find the probabilities Pi,j in the stationary case we obtain the following system of linear equations (24):  (t) = (1 − r)μ1 Pn−1,1 (t) + γ1 Pn−1,0 (t); λn Pn,0

(μj + λn−j )Pn−j,j (t) = λn−j+1 Pn−j+1,j−1 (t) + (1 − r)μj+1 Pn−j−1,j+1 (t) + γ1 Pn−j−1,j (t), j = 1, n − d; μn−d+1 Pd−1,n−d+1 (t) = λd Pd,n−d (t); (λn−1 + γ1 )Pn−1,0 (t) = rμ1 Pn−1,1 (t) + μ1 Pn−2,1 (t) (μj + λn−i−j + γ1 )Pn−j−1,j (t) = λn−j Pn−j,j−1 (t) + rμj+1 Pn−j−1,j+1 (t) + μj+1 Pn−j−2,j+1 (t), j = 1, n − d − 1; (μn−d + γ1 )Pd−1,n−d (t) = λd Pd,n−d−1 (t) + rμn−d+1 Pd−1,n−d+1 (t). (24) Assuming the probabilities Pd−1,n−d+1 , Pd−1,n−d as 2 basic probabilities, we will use them to express all the other probabilities. Based on the condition (d−1, n−d), express the probability Pd,n−d−1 , based on the state (d−1, n−d+1) is the probability Pd,n−d , based on the state (d, n − d − 1) is the probability Pd+1,n−d−2 , based on the state (d, n−d) - the probability Pd+1,n−d−1 , etc. based on the state (n − 2, 1) is the probability Pn−1,0 , and based on the state (n − 2, 2) - probability Pn−1,1 . Now, based on the state (n − 1, 0), we get another expression for determining the probability Pn−1,1 through the 2nd base probabilities

Integrated Tolerant Distributed Computing Network

325

Pd−1,n−d+1 , Pd−1,n−d , which reduces the number of base probabilities to one, for example, Pd−1,n−d+1 . The state (n, 0) gives the last equation for determining the probability Pn,0 . Finally, the normalization condition provides finding the base probability Pd−1,n−d+1 , and thus all probabilities. In accordance with the above algorithm for solving a system of linear equations, the paper developed its software implementation. 2.4

Evaluation of the Effectiveness of the Approximate Model

Based on the obtained solutions, the accuracy of the approximate model is estimated in relation to the exact model, in particular, for the average number of modules performing functional tasks. The results of calculations of the average number of modules that perform functional tasks for accurate and approximate models with a wide variation of parameter values (the intensities of working TSM and controlling TSM, the probability of r failure of the CM, the intensity of restoring the CM’s with the number n = 5 TSM and d = 3 copies of a single task) show that the maximum inaccuracy of the approximate model when changing the parameter values in the intervals, n = 5, d = 3, r = 0.1 is about 4%. The speed of calculations for the approximate model increases by a factor of O(n/2) in relation to the exact model.

References 1. Qu, P., Zhang, Y., Zheng, W.: High Performance simulation of spiking neural network on GPGPUs. IEEE Trans. Parallel Distrib. Syst. 31(11), 2510–2523 (2020) 2. Pons, L., Sahuquillo, J., Selfa, V., Petit, S., Pons, J.: Phase-aware cache partitioning to target both turnaround time and system performance. IEEE Trans. Parallel Distrib. Syst. 31(11), 2556–2568 (2020) 3. Szustak, L., Wyrzykowski, R., Olas, T., Mele, V.: Correlation of performance optimizations and energy consumption for stencil-based application on Intel Xeon scalable processors. IEEE Trans. Parallel Distrib. Syst. 31(11), 2582–2593 (2020) 4. KhudaBukhsh, W.R., Kar, S., Alt, B., Rizk, A., Koeppl, H.: Generalized cost-based job scheduling in very large heterogeneous cluster systems. IEEE Trans. Parallel Distrib. Syst. 31(11), 2594–2604 (2020) 5. Li, J., et al.: QWEB: high-performance event-driven web architecture with QAT acceleration. IEEE Trans. Parallel Distrib. Syst. 31(11), 2633–2649 (2020) 6. Srinuan, P., Yuan, X., Tzeng, N.: Cooperative memory expansion via OS kernel support for networked computing systems. IEEE Trans. Parallel Distrib. Syst. 31(11), 2650–2667 (2020) 7. Akhremtsev, Y., Sanders, P., Schulz, C.: High-quality shared-memory graph partitioning. IEEE Trans. Parallel Distrib. Syst. 31(11), 2710–2722 (2020) 8. Losada, N., Bosilca, G., Bouteiller, A., Gonz´ alez, P., Mart´ın, M.J.: Local rollback for resilient MPI applications with application-level checkpointing and message logging. Future Gener. Comput. Syst. 91, 450–464 (2019) 9. Losada, N., Gonz´ alez, P., Mart´ın, M.J., Bosilca, G., Bouteiller, A., Teranishi, K.: Fault tolerance of MPI applications in exascale systems: The ULFM solution. Future Gener. Comput. Syst. 106, 467–481 (2020)

326

O. Brekhov

10. Tang, X., Zhai, J., Yu, B., Chen, W., Zheng, W., Li, K.: An efficient in-memory checkpoint method and its practice on fault-tolerant HPL. IEEE Trans. Parallel Distrib. Syst. 29(4), 758–771 (2018) 11. Wang, Z., Gao, L., Gu, Y., Bao, Y., Yu, G.: A fault-tolerant framework for asynchronous iterative computations in cloud environments. IEEE Trans. Parallel Distrib. Syst. 29(8), 1678–1692 (2018) 12. Cores, I., Rodr´ıguez, G., Mart´ın, M.J., Gonz´ alez, P.: Achieving checkpointing global consistency through a hybrid compile time and runtime protocol. Procedia Comput. Sci. 18, 169–178 (2013) 13. Luo, Y., Manivannan, D.: Hope: a hybrid optimistic checkpointing and selective pessimistic message logging protocol for large scale distributed systems. Future Gener. Comput. Syst. 28(8), 1217–1235 (2012) 14. Castro-Le, M., Meyer, H., Rexachs, D., Luque, E.: Fault tolerance at system level based on radic architecture. J. Parallel Distrib. Comput. 86, 98–111 (2015) 15. Panadero, J., Wong, A., Rexachs, D., Luque, E.: P3S: a methodology to analyze and predict application scalability. IEEE Trans. Parallel Distrib. Syst. 29(3), 642– 658 (2017) 16. Mohror, K., Moody, A., Bronevetsky, G., de Supinski, B.R.: Detailed modeling and evaluation of a scalable multilevel checkpointing system. IEEE Trans. Parallel Distrib. Syst. 25(9), 2255–2263 (2014) 17. Bland, W., Bouteiller, A., Herault, T., Bosilca, G., Dongarra, J.: Post-failure recovery of MPI communication capability: design and rationale. Int. J. High Perform. Comput. Appl. 27(3), 244–254 (2013) 18. Meyer, H., Muresano, R., Castro-Le´ on, M., Rexachs, D., Luque, E.: Hybrid message pessimistic logging. Improving current pessimistic message logging protocols. J. Parallel Distrib. Comput. 104, 206–222 (2017) 19. Wong, A., Rexachs, D., Luque, E.: Parallel application signature for performance analysis and prediction. IEEE Trans. Parallel Distrib. Syst. 26(7), 2009–2019 (2015) 20. Skrzypczak, J., Schintke, F., Sch¨ utt, T.: Fault-tolerant in-place consensus sequences. IEEE Trans. Parallel Distrib. Syst. 31(10), 2392–2405 (2020) 21. Zhong, D., Bouteiller, A., Luo, X., Bosilca, G.: Runtime level failure detection and propagation in HPC systems. In: Proceedings of the 26th European MPI Users’ Group Meeting, EuroMPI 2019, pp. 1–11 (2019) 22. Castro, M., Rexachs, D., Luque, E.: Radic-based message passing fault tolerance system. In: Proceedings of the the 6th International Conference on Advanced Engineering Computing and Applications in Sciences, pp. 59–64 (2012) 23. Cao, J., et al.: System-level scalable checkpoint-restart for petascale computing. In: Proceedings of the IEEE 22nd International Conference on Parallel and Distributed Systems, pp. 932–941 (2016) 24. Hassani, A., Skjellum, A., Brightwell, R.: Design and evaluation of FA-MPI, a transactional resilience scheme for non-blocking MPI. In: Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pp. 750–755 (2014)

Asymptotic Analysis of RQ-System with Feedback and Batch Poisson Arrival Under the Condition of Increasing Average Waiting Time in Orbit A. A. Nazarov1 , S. V. Rozhkova1,2 , and E. Yu. Titarenko1,2(B) 1

National Research Tomsk State University, Lenin Avenue 36, Tomsk 634050, Russia [email protected] 2 National Research Tomsk Polytechnic University, Lenin Avenue 30, Tomsk 634050, Russia {rozhkova,teu}@tpu.ru https://tsu.ru/, https://tpu.ru/

Abstract. The paper studies the retrial queueing system M[n] /M/1 with feedback and batch Poisson arrival. Customers for the system come in groups. Not more than one customer is served at once, others wait in the orbit. Having been served, the customer leaves the system or goes to re-service or into the orbit. An asymptotic analysis method is used to find the stationary distribution of the number of customers in the orbit. A long delay between customers from the orbit is proposed as an asymptotic condition. It is proved that the asymptotic probability distribution of the number of customers in the orbit is Gaussian. As a result the parameters of this distribution are obtained. The calculations to determine the range of the method applicability are carried out. The accuracy of the approximation is compared to numerical results obtained by matrix method.

Keywords: Queuing system Asymptotic analysis

1

· RQ system · Batch arrival · Feedback ·

Introduction

Queueing systems are widely used in various fields: call centers, intelligent transport systems, telecommunication networks, etc. [1]. Classical models of queuing theory do not appropriately describe the real technical systems, where the effect of repeated calls is observed. Therefore, to analyze these systems characteristics we use the retrial queueing system (RQ systems). Models with repeat calls are widely used for designing and optimizing information and communication systems, digital communication networks controlled by protocols of random multiple access. They are also used in many other areas. RQ systems are characterized by the fact that customers arriving in the system, go into the waiting area in c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 327–339, 2020. https://doi.org/10.1007/978-3-030-66242-4_26

328

A. A. Nazarov et al.

case the server is busy, and after some random time they retries the service. Between retries customers are in the source of repeat calls (or orbit). Retrial queuing systems are considered in many works [2–4]. A review of works on this topic is given in [5,6]. However, in practice due to poor service or some external factors a customer might require re-service. Similar situations occur in multi-agent systems, where a customer having received satisfactory service requires reservice from the same agent. The behavior of such systems is accurately described by queuing systems with feedback. The application of queuing theory to optimize the performance of multi-agent systems is described in detail in [7–10]. Models of queuing systems with feedback are poorly studied. There are some works devoted to re-service and feedback [11–13]. Methods for analysis of multichannel queueing system with instantaneous and delayed feedbacks are considered in [11]. Queueing system MMPP|M |∞ with repeated service is investigated in [12]. In this paper, we study a single-channel RQ-system with exponentially distributed service time, a batch Poisson arrival, instantaneous and delayed feedbacks. We use an asymptotic analysis method under the asymptotic condition of a growing average waiting time in the orbit.

2

The Model Description and the Problem Statement

We consider the M[n] /M/1 queuing system (see Fig. 1) with repeated calls and batch Poisson arrival process with parameter λ and given probabilities qν of ∞  qν = 1. occurrence of customers in the group. We assume that ν > 0, q0 = 0, ν=1

An incoming customer, which sees a server idle, occupies it, other customers from the group go to the source of the repeated calls (into orbit). Also, if the server is busy, arriving customers go into orbit. Service time is exponentially distributed with parameter μ. Having been served, the customer leaves the system with probability r0 , or goes to re-service with probability r1 (instantaneous feedback), or into orbit with probability r2 (delayed feedback), so r0 + r1 + r2 = 1. In the orbit each customer independently of others waits for the time exponentially distributed with parameter σ. Then the customer occupies the device if it is idle or remains in the orbit. We define the Markov process {i(t), n(t)} of changing the states of the RQsystem, where i(t) is the number of customers in the orbit at time t, i(t) = 0, 1, 2, . . ., the process n(t) determines the state of the server at time t, and takes one of two values: n(t) = 0, if the server is idle, n(t) = 1, if the server is busy. Our aim is to find the stationary probability distribution of the number of customers in the orbit taking into account the state of the server Pn (i) = P {n(t) = n; i(t) = i}, n = 0, 1, i = 0, ∞.

Asymptotic Analysis of RQ-System with Feedback

329

Fig. 1. System diagram.

3

Kolmogorov Equations

To obtain the probability distribution for the number of customers in the orbit, we apply the Δt-method. We fix the time t and a small time increment Δt. Then we express probability state distribution of the Markov process at time point t + Δt by its probability state distribution at an arbitrary time point t P0 (i, t + Δt) = P0 (i, t)(1 − λΔt)(1 − iσΔt) + μr0 ΔtP1 (i, t) + μr2 ΔtP1 (i − 1, t) + o(Δt); P1 (i, t + Δt) = P1 (i, t)(1 − λΔt)(1 − μr0 Δt)(1 − μr2 Δt) + (i + 1)σΔtP0 (i + 1) +

i+1 

λqν ΔtP0 (i − ν + 1) +

ν=1

i 

λqν ΔtP1 (i − ν) + o(Δt).

ν=1

The result is a system of differential equations for the probabilities Pn (i, t) ∂P0 (i,t) = −(λ + iσ)P0 (i, t) + μr0 P1 (i, t) + μr2 P1 (i − 1, t); ∂t ∂P1 (i,t) = (i + 1)σP0 (i + 1, t) − (μr0 + μr2 + λ)P1 (i, t) ∂t i+1 i  

+

ν=1

λqν P0 (i − ν + 1, t) +

ν=1

λqν P1 (i − ν, t).

From this system we derive the system of Kolmogorov equations for the stationary probabilities Pn (i) − (λ + iσ)P0 (i) + μr0 P1 (i) + μr2 P1 (i − 1) = 0; (i + 1)σP0 (i + 1) − (μr0 + μr2 + λ)P1 (i) +

i+1 

λqν P0 (i − ν + 1) +

ν=1

i 

(1)

λqν P1 (i − ν) = 0

ν=1

and write the normalization condition ∞ 

[P0 (i) + P1 (i)] = 1.

(2)

i=0

Let us note that the stability condition has the form ρ < 1, where ρ = λ¯ ν /μr0 , ∞  νqν is the average number of customers in the group. ν¯ = ν=1

330

A. A. Nazarov et al.

We consider the partial characteristic functions of the number of customers in the orbit ∞  Hn (u) = ejui Pn (i) i=0

and the characteristic function of the number of customers in the group h(u) =

∞ 

ejuν qν ,

ν=1

where j =



−1. We take into account ∞

∂Hn (u)  jui = ije Pn (i), ∂u i=0 ∞  i 

jui

qν e

P1 (i − ν) =

i=0 ν=1 ∞  i+1 

∞ 

qν e

ν=1

qν ejui P0 (i − ν + 1) = e−ju

i=0 ν=1

juν

∞  ν=1

∞ 

ejui P1 (i) = h(u)H1 (u),

i=0

qν ejuν

∞ 

ejui P0 (i) = e−ju h(u)H0 (u),

i=0

and rewrite system (1) as σj

  ∂H0 (u) − λH0 (u) + μr0 + μr2 eju H1 (u) = 0; ∂u

(3)

∂H0 (u) + λe−ju h(u)H0 (u) + (λh(u) − μr0 − μr2 − λ) H1 (u) = 0. ∂u The characteristic function H(u) of the number of customers in the orbit for system (3) is expressed in terms of the partial characteristic functions Hn (u) by the following H(u) = H0 (u) + H1 (u). Applying the inverse Fourier transform to the characteristic function, we can write the probability distribution as −σje−ju

1 P (i) = 2π



e−jui H(u)du, i = 0, ∞

−π

and mathematical expectation as E {i(t)} = −jH  (0). However, it is hardly possible to obtain an analytical expression for these integrals, therefore, it is reasonable to use numerical integration methods. But numerical calculations are computationally expensive, so we consider the asymptotic analysis method which allows us to receive an analytical approximation for the distribution P (i). Using numerical experiments, we analyze the accuracy of the method.

Asymptotic Analysis of RQ-System with Feedback

4

331

Asymptotics of the First Order

We solve the equations for the characteristic functions (2) under the asymptotic condition of a growing average waiting time in the orbit, i.e. σ → 0. We formulate the result in the following theorem. Theorem 1. Let i(t) be the number of customers in the orbit in the M[n] /M/1 RQ-system with a batch Poisson arrival and feedback. Then there is the following equality for a sequence of characteristic functions   lim E ejwi(t)σ = ejwκ1 σ→0

where

∞  μ¯ ν (r0 + r2 ) κ1 = λ − λ, ν¯ = νqν . μr0 − λ¯ ν ν=1

Proof. In the system of Eqs. (3) we use the substitutions σ = ε, u = εw, Hn (u) = Fn (w, ε). Since

∂H0 (u) 1 ∂F0 (w, ε) = , ∂u ε ∂w the system (3) can be written as j

  ∂F0 (w, ε) − λF0 (w, ε) + μr0 + μr2 ejwε F1 (w, ε) = 0; ∂w

(4)

∂F0 (w, ε) + λe−jwε h(w, ε)F0 (w, ε) ∂w + (λh(w, ε) − μr0 − μr2 − λ) F1 (w, ε) = 0.

−je−jwε

Let ε → 0, Fn (w) = lim Fn (w, ε). Since lim h(w, ε) = 1, the system (3) is ε→0

transformed into an equation j

ε→0

∂F0 (w) − λF0 (w) + (μr0 + μr2 ) F1 (w) = 0. ∂w

We find a solution to the equation of the form Fn (w) = Rn ejwκ1 ,

(5)

− (κ1 + λ)R0 + (μr0 + μr2 )R1 = 0.

(6)

then Then, summing the equations of system (4), we obtain     (w,ε) − λ 1 − e−jwεh(w, ε) F0 (w, ε) j 1 − e−jwε ∂F0∂w + μr2 (ejwε − 1) + λ(h(w, ε) − 1) F1 (w, ε) = 0,

332

A. A. Nazarov et al.

divide it by ε −jwε

j 1−e ε

·

+ μr2 ·

−jwε ∂F0 (w,ε) − λ 1−e ε h(w,ε) · F0 (w, ε) ∂w

h(w,ε)−1 ejwε −1 +λ· F1 (w, ε) = 0 ε ε

and assume ε → 0 j where ν¯ =

∂F0 (w) + λ (¯ ν − 1) · F0 (w) + (μr2 + λ¯ ν ) F1 (w) = 0, ∂w

∞  ν=1

νqν is the average number of customers in the group. We carry

out the substitution (5) and obtain the equation − (κ1 + λ − λ¯ ν )R0 + (μr2 + λ¯ ν ) R1 = 0

(7)

Solving the system of Eqs. (6) and (7) with the additional condition R0 +R1 = 1, we obtain R0 =

μ(r0 + r2 ) κ1 + λ , R1 = κ1 + λ + μ(r0 + r2 ) κ1 + λ + μ(r0 + r2 ) κ1 = λ

(8)

μ¯ ν (r0 + r2 ) − λ. μr0 − λ¯ ν

Thus, the asymptotic approximation of the characteristic function is F (w) = exp{jwκ1 }. Asymptotics of the first order determines the average value of the number of customers in the orbit. For a more detailed study of the process i(t), we should consider the second-order asymptotics.

5

Asymptotics of the Second Order

The main result of the analysis of the second-order asymptotics is presented in the following theorem. Theorem 2. Let i(t) be the number of customers in the orbit in the M[n] /M/1 RQ-system with a batch Poisson arrival and feedback. Then there is an equality as follows: 2   √ (jw) κ1  lim E exp jw σ i(t) − = exp κ2 , (9) σ→0 σ 2 where κ2 =



λμr0 2

2(μr0 − λ¯ ν)

∞   2λ¯ ν + μν2 (r0 + r2 ) + μ¯ ν (r2 − r1 ) , ν2 = ν 2 qν . 2

ν=1

Asymptotic Analysis of RQ-System with Feedback

333

Proof. In the system of Eqs. (3), we use the substitutions Hn (u) = Hn(2) (u) · ejuκ1 /σ . (2)

Here Hn (u) is the partial characteristic function of the centered random vari(2) able i(t) − κ1 /σ. The system of equations for Hn (u) is (2)

σj

∂H0 (u) ∂u

 (2)  (2) − (κ1 + λ)H0 (u) + μr0 + μr2 eju H1 (u) = 0; ∂H

(2)

−σje−ju 0∂u + (κ1 + λh(u)) e−ju H0 (u) (2) + (λh(u) − μr0 − μr2 − λ) H1 (u) = 0. (u)

(2)

(2)

(2)

Let σ = ε2 and use the substitutions u = εw, Hn (u) = Fn (w, ε), then we obtain the system  (2)  ∂F0 (w, ε) (2) − (κ1 + λ)F0 (w, ε) + μr0 + μr2 ejwε F1 (w, ε) = 0; ∂w (2)

εj

∂F

(2)

(10)

+ (κ1 + λh(w, ε)) e−jwε F0 (w, ε) −εje−jwε 0 ∂w (2) + (λh(w, ε) − μr0 − μr2 − λ) F1 (w, ε) = 0. (w,ε)

(2)

(2)

The solution for the functions Fn (w, ε) has the following form Fn(2) (w, ε) = Φ(w) · (Rn + jεwfn ) + O(ε2 )

(11)

We substitute (11) into (10), use the approximation for exp{±jwε} and h(εw) = 1 + jεw¯ ν + O(ε2 ), take into account (6) and (7), and convert the system of Eqs. (10) into an equation ∂(w) 1 1 = [(κ1 + λ)f0 − (μr0 + μr2 ) f1 − μr2 R1 ] . ∂w wΦ(w) R0

(12)

Let us denote κ2 = −

1 [(κ1 + λ)f0 − (μr0 + μr2 ) f1 − μr2 R1 ] R0

(13)

and Eq. (12) has the form 1 ∂(w) = −wκ2 , Φ(w) ∂w therefore, the function Φ(w) can be represented in the form

 1 Φ(w) = exp − w2 κ2 2

(14)

334

A. A. Nazarov et al.

that correlates with (9). To find unknown functions f0 , f1 and an explicit form for κ2 , we rewrite (13) as −(κ1 + λ)f0 + μ (r0 + r2 ) f1 = κ2 R0 − μr2 R1 . Functions f0 , f1 can be written as the sum of a general solution of the homogeneous equation and two particular solutions: fn = C · Rn + gn + κ2 ϕn , n = 0, 1.

(15)

Here C · Rn are the general solution of the homogeneous equation due to (6), while gn is the solution of the equation −(κ1 + λ)g0 + μ (r0 + r2 ) g1 = −μr2 R1 ,

(16)

and ϕn satisfies the equation −(κ1 + λ)κ2 ϕ0 + μ (r0 + r2 ) κ2 ϕ1 = κ2 R0 .

(17)

Differentiating (6) with respect to κ and comparing with (17), we note that ∂R0 ∂R1 , ϕ1 = , ϕ0 + ϕ1 = 0. ∂κ ∂κ

ϕ0 =

Then, taking into account (8), we obtain ϕ0 = −

μ(r0 + r2 ) (κ1 + λ + μ(r0 + r2 ))

2,

ϕ1 = −ϕ0 .

Similarly, we assume g0 + g1 = 0 and receive from Eq. (16) g0 =

μr2 R1 , g1 = −g0 . κ1 + λ + μ(r0 + r2 )

In order to find the explicit form κ, we sum the equations of the system (10)   ∂F0(2) (w,ε)   (2) −εj e−jwε − 1 κ1 (e−jwε − 1) + λ(h(w, ε)e−jwε − 1) F0 (w, ε) ∂w   (2) + μr2 (ejwε − 1) + λ(h(w, ε) − 1) F1 (w, ε) = 0. (2)

2

We write the solution for Fn (w, ε) as (11), exp{±jwε} = 1 ± jwε + (jwε) /2 + ∞  2 ν + (jεw) ν2 /2 + O(ε3 ), where ν2 = ν 2 qν . After some O(ε3 ), h(εw) = 1 + jεw¯ ν=1

transformation and using expressions (7) and (14), we assume ε → 0 and obtain 1 1 (κ1 + λ + λν2 − 2λ¯ ν )R0 + (μr2 + λν2 ) R1 2 2 − (κ1 + λ − λ¯ ν )f0 + (μr2 + λ¯ ν ) f1

R 0 κ2 =

(18)

Substituting (15) into (18) and taking into account (7), (16), (17), expressions for R0 , R1 , ϕ1 , g1 , we finally obtain κ2 =



λμr0 2(μr0 − λ¯ ν)

2

 2λ¯ ν 2 + μν2 (r0 + r2 ) + μ¯ ν (r2 − r1 ) .

Asymptotic Analysis of RQ-System with Feedback

335

Theorem 2 shows that the asymptotic probability distribution of the number of customers in the orbit in the M[n] /M/1 RQ-system with a batch Poisson arrival and feedback is Gaussian with the parameters κ1 /σ and κ2 /σ, which allows us to make the following approximation for the distribution P (i) as Papr (i) =

G(i + 0.5) − G(i − 0.5) , 1 − G(−0.5)

where G(x) is the normal distribution function with parameters κ1 /σ and κ2 /σ.

6

Numerical Matrix Method

To evaluate the accuracy of the asymptotic analysis method we propose a numerical matrix method and compare the resulting Gaussian approximation to the distribution obtained by numerical method. Let us consider the system (1) of infinite dimension and the Eq. (2). Then we truncate the system dimension and rewrite the system (1) and (2) for i = 0, 1, 2, . . . , N in matrix form P S = B, where the row vector P of dimension 2(N + 1) is stationary probability distribution of the number of customers in the orbit P = (P0 (0), P0 (1), P0 (2) . . . P0 (N ), P1 (0), P1 (1), P1 (2) . . . P1 (N )). Matrix S of dimension 2(N + 1) × [2(N + 1) + 1] is represented in block form   S11 S12 S13 , S= S21 S22 S23    12   21   22        (i, j = 0, 1, . . . , N )  where S11 = s11 ij , S12 = sij , S21 = sij , S22 = sij are matrices of dimension (N + 1) × (N + 1) whose nonzero elements are defined as as

s11 ii = −λ − (i − 1)σ, 21 sii = μr0 , s21 i−1,i = μr2 , 12 12 12 s12 i+1,i = iσ, sii = λq1 , si−1,i = λq2 , . . . , s0,i = λqi+1 , 22 22 22 sii = μr1 − μ − λ, si−1,i = λq1 , si−2,i = λq2 , . . . , s22 0,i = λqi . Blocks S13 , S23 are unit vector columns of dimension (N + 1). The row vector B = bn  of dimension 2(N + 1) + 1 is the row of free coefficients with elements bn = 0 (n = 0, 1, 2, . . . , 2N + 1), b2N +2 = 1. The vector P is easily calculated by the obvious formula

−1 P = BST SST . We use a numerical algorithm and choose N to be so large that probabilities P0 (N ) and P1 (N ) are equal to the machine zero. However, despite the high accuracy, the use of the numerical method is limited by the computer capacity.

336

7

A. A. Nazarov et al.

Numerical Results

We consider the system with parameters λ = 1, μ = 7, r0 = 0.5, r1 = 0.3, r2 = 0.2, q1 = 0.5, q2 = 0.3, q3 = 0.1, q4 = 0.1, q5 = 0, q6 = 0, . . .. Table 1 shows the results of calculating the mathematical expectation of the number of customers in the orbit for various values of σ. For each value of σ, the exact value of E{i(t)} obtained with characteristic function, the asymptotic value of the mathematical expectation κ1 /σ, and the relative error δ are presented. The relative error is calculated by the formula   E {i(t)} − κ  σ . δ= E {i(t)}

Table 1. Approximation of the average number of customers. σ

1

0.5

0.1

0.01

0.005

E{i(t)} 5.439 9.627 43.133 420.074 838.897 κ1 /σ

4.188 8.376 41.882 418.824 837.647

δ

0.2

0.1

0.03

0.003

0.001

The results show a sufficient accuracy of approximation of the average number of customers when σ ≤ 0.1. Figure 2 and Fig. 3 show the probability distributions obtained by the method of asymptotic analysis when σ = 0.5 and σ = 0.01, as well as a comparison with the distribution obtained by the numerical matrix method. It is noted that the approximation is quite good when parameter σ is lower. To determine the accuracy of the approximation Papr (i), we use the Kolmogorov distance  k      (Papr (i) − P (i)) Δ = max   0≤k x) > 0, we define the failure rate function as fX (x) rX (x) = . (3) F X (x) The quantity r(x)dx plays an important role in the reliability theory and queueing theory representing the condition probability that a failure occurs in the interval

342

I. Peshkova et al.

of time (x, x + dx) provided that a device is still working at instant x, see [7]. It is easy to check that the failure rate function for mixture (2) has the following form: pfX (x) + (1 − p)fX2 (x) . (4) rX (x) = ¯ 1 pFX1 (x) + (1 − p)F¯X2 (x) The failure rate function of a mixture of distributions tends to follow, in the long run, to the lowest failure rate function of the mixture components (if exists) [7], that is, rX (x) ∼ min(rX1 (x), rX2 (x)), as x → ∞, (5) where a ∼ b means a/b → 1. We continue by considering three examples of mixtures. Let X1 , X2 have an Exponential distribution, denoted Exp(λi ), that is FXi (x) = 1 − e−λi x , x ≥ 0, λi > 0, with constant failure rate, rXi (x) = λi , i = 1, 2. Then the mixture (2) has the Hyperexponential distribution, denoted Hyper(λ1 , λ2 .p), which has the tail distribution 1 − FX (x) =: F X (x) = pe−λ1 x + (1 − p)e−λ2 x , x > 0,

(6)

and decreasing failure rate (DFR) function, rX (x) =

pλ1 e−λ1 x + (1 − p)λ2 e−λ2 x . pe−λ1 x + (1 − p)e−λ2 x

(7)

It is easy to see that rX (x) → min(λ1 , λ2 ). x→∞

We emphasize that the Hyperexponential distribution has DFR property, while each component in mixture (6) has constant failure rate. The explanation of this effect is given, for instance, in [14]. Let Y1 have exponential distribution Exp(λ) and Y2 have Pareto type-2 distribution, denoted P areto(α, x0 ), with distribution  α x0 , x ≥ 0, x0 > 0, α > 0, (8) FY2 (x) = 1 − x0 + x and DFR failure rate function rY2 (x) =

α , x ≥ 0, x0 + x

(9)

vanishing as x → ∞. We say that the mixture Y = I Y1 + (1 − I) Y2

(10)

On Comparison of Multiserver Systems

has Exponential-Pareto mixture distribution with tail distribution  α x0 F¯Y (x) = pe−λx + (1 − p) , x ≥ 0. x0 + x

343

(11)

It is easy to calculate that the failure rate of Y equals rY (x) =

p rY1 (x)a(x) + (1 − p) rY2 (x) , p a(x) + (1 − p)

where −λx



a(x) = e Note that rY (x) → 0 as

x 1+ x0

(12)

α , x ≥ 0.

x → ∞. Now we consider the mixture Z = IZ1 + (1 − I)Z2 ,

(13)

where Zi have Pareto type-2 P areto(αi , x0 ) distributions (8), implying   α1 α2 x0 x0 ¯ FZ (x) = p + (1 − p) x0 + x x0 + x

(14)

It is known that the mixture of DFR distributions is a DFR distribution as well [7]. The failure rate of mixture (13) is given by rZ (x) = where

prZ1 (x)a(x) + (1 − p)rZ2 (x) , pa(x) + (1 − p)

(15)

1 −α2 a(x) = xα (x0 + x)α2 −α1 . 0

Note that rZ (x) → 0, x → ∞. Since  rZ (x) = −(1 − p)

2 pa(x)(rZ1 (x) − rZ2 (x))2 + rZ (x)/α(pa(x) + (1 − p)) 2 < 0, (pa(x) + (1 − p))2

then rZ (x) is decreasing function and FZ (x) is DFR function.

3

Stochastic and Failure Rate Ordering of Two-Component Mixture Distributions

First we consider the connection between stochastic ordering and failure rate ordering. Let X and Y be non-negative random variables with distribution functions FX , FY , and densities fX , fY , respectively. We say that X is less than Y stochastically (in distribution), and denote it as X ≤ Y , if st

F X (x) ≤ F Y (x), x ≥ 0;

(16)

344

I. Peshkova et al.

We say that X is less than Y in failure rate, and denote it X ≤ Y , if r

rX (x) ≥ rY (x), for all x ≥ 0.

(17)

There are the following well-known relation between stochastic ordering and failure rate ordering [13]: X≤Y ⇒ X≤Y . r

st

(18)

It is evident that the latter in turns implies EX ≤ EY . The next theorem states that if the components of the mixture are ordered (stochastically or in failure rate), then the mixture has the corresponding lower and upper bounds. Theorem 1. If the random variable X has representation (2), then X 1 ≤ X2 ⇒ X1 ≤ X ≤ X2 ;

(19)

X1 ≤ X2 ⇒ X1 ≤ X ≤ X2 .

(20)

st

st

r

r

st

r

Proof. From the stochastic ordering X1 ≤ X2 it follows that F¯X1 (x) ≤ F¯X2 (x). st

It is then obvious that

F¯X1 (x) ≤ pF¯X1 (x) + (1 − p)F¯X2 (x) ≤ F¯X2 (x). On the other hand, the failure rate ordering X1 ≤ X2 means that r

fX2 (x) ≤

fX1 (x)F¯X2 (x) , F¯X (x) 1

and hence we obtain, rX (x) ≤

pfX1 (x) + (1 − p)fX1 (x)F¯X2 (x)/F¯X1 (x) = rX1 (x), pF¯X1 (x) + (1 − p)F¯X2 (x)

that, in turn, gives the inequality X1 ≤ X. Further, the inequalities r

fX1 (x) ≥ and rX (x) ≥

fX2 (x)F¯X1 (x) F¯X2 (x)

pfX2 (x)F¯X1 (x)/F¯X2 (x) + (1 − p)fX2 (x) = rX2 , pF¯X1 (x) + (1 − p)F¯X2 (x)

implies X ≤ X2 , completing the proof. r



On Comparison of Multiserver Systems

345

Now we compare two mixtures with different finite mixture distributions and with the same mixing proportion p: FX (x) = pFX1 (x) + (1 − p)FX2 (x), FY (x) = pFY1 (x) + (1 − p)FY2 (x). Suppose that the components are stochastically ordered in the following way X1 ≤ Y1 ,

X2 ≤ Y2 .

st

st

(21)

It is known that if the random variables X1 , Y1 , X2 , Y2 are (mutually) independent, then the mixtures are stochastically ordered as follows [7]: X ≤ Y.

(22)

st

However, to compare the mixtures in the failure rate, some additional conditions must hold. The following statement is a modification of Theorem 2.1 from [1]. Theorem 2. Assume the following conditions hold: X1 ≤ X2 or Y1 ≤ Y2 ;

(23)

min(X1 , Y2 ) ≥ min(X2 , Y1 );

(24)

X1 ≤ Y1 , X2 ≤ Y2 .

(25)

r

r

st r

r

Then X ≤ Y. r

(26)

The results presented in (18)–(26), in particular, allow to establish the monotonicity properties of the stochastic processes in the queueing systems with different mixture distributions of the interarrival or/and service times. We present such results in Sect. 4 for the Hyperexponential, Exponential-Pareto mixtures and for the two-component Pareto mixture. It is important to note that the failure rate comparison of the different distributions can be often presented in an explicit form and moreover, as we mentioned above, this ordering implies the stochastic ordering. By this reason, in what follows, we use the failure rate ordering to establish, as a consequence, the stochastic ordering of the corresponding queueing systems.

4

Stochastic and Failure Rate Comparison of Some Two-Component Mixture Distributions

In this section, we demonstrate the failure rate ordering technique for mixture distributions. We consider Exponential-Pareto mixture, two-component Pareto mixture and two-component Hyperexponential mixture. Moreover we establish some auxiliary results which are used further in Sect. 5.

346

I. Peshkova et al.

Suppose that X has the Hyperexponential distribution (6), Y has the Exponential - Pareto mixture distribution (11) and Z has two-component Pareto mixture distribution (14). Now we establish conditions on the basic parameters λ, λ1 , λ2 , α, α1 , α2 , which imply the stochastic and failure rate ordering of the mixtures. Theorem 3. Assume that the distributions of X, Y , Z satisfy (6), (11) and (14), respectively, and the following relations hold: α1 λ1 ≥ λ ≥ ; (27) x0 α α2 ≥ . (28) λ2 ≥ x0 x0 Then (29) X ≤ Y ≤ Z. st

st

Proof. It is easy to check that if the following relations between parameters hold, α , (30) λ1 ≥ λ and λ2 ≥ x0 then the components of mixtures are ordered in the failure rate as follows: X1 ≤ Y1 , X2 ≤ Y2 .

(31)

X1 ≤ Y1 , X2 ≤ Y2 ,

(32)

r

r

But as we know, (31) implies st

st

and thus it follows from (21) and (22) that X ≤ Y. st

If the parameters of the Exponential-Pareto mixture and two-component Pareto mixture are connected by the following relations, α1 , α ≥ α2 , (33) λ≥ x0 then the following implications hold: rYi (x) ≥ rZi (x) ⇒ Yi ≤ Zi ⇒ Yi ≤ Zi , i = 1, 2 ⇒ Y ≤ Z. r

st

st

Thus, under conditions (27) and (28) the mixtures X, Y , Z are stochastically ordered as in (29).

Theorem 4. If the random variables X, Y , Z have the (tail) distributions (6), (11), and (14), respectively, and the following relations hold α1 α2 α ≤ ≤ ≤ λ ≤ λ1 ≤ λ2 , (34) x0 x0 x0 then the following failure rate ordering holds: X ≤ Y ≤ Z. r

r

(35)

On Comparison of Multiserver Systems

347

Proof. First we mention that relation (34) imply conditions (27) and (28). Hence, it follows from the proof of Theorem 3, that Xi ≤ Yi , Yi ≤ Zi , i = 1, 2, r

r

and assumption (24) is fulfilled. In order to check whether the mixtures are ordered by failure rate, it remains to check the expressions (23) and (24). Let λ1 ≤ λ2 , then X1 ≥ X2 . As it is easy r

to see, condition (24) for mixtures X and Y can be written as  α x0 ≥ e−(λ + λ2 − λ1 )x , x ≥ 0. x0 + x

(36)

To verify this inequality, we note that if λ ≥ α/x0 then Y1 ≤ Y2 and condition r

(23) is fulfilled, which in turn implies Y1 ≤ Y2 . st

But the latter inequality can be written as  α x0 ≥ e−λx , x ≥ 0, x0 + x and then (36) follows because e−λx ≥ e−(λ + λ2 − λ1 )x . Thus, the following implication holds: α ⇒ X ≤ Y. (37) λ2 ≥ λ1 ≥ λ ≥ x0 r It remains to check inequality (24), which is equivalent to the inequality  α1 +α−α2 x0 −λx e ≥ , x ≥ 0. (38) x0 + x Let α1 ≤ α2 , then we have Z1 ≥ Z2 . Because Y1 ≤ Z1 , then it follows that r

e−λx ≥



x0 x0 + x

α1

st

, x≥0

and we can conclude that (24) holds since  α1  α1 +α−α2 x0 x0 ≥ , x ≥ 0. x0 + x x0 + x Thus the following implication takes place: α1 ≤ α2 ≤ α ≤ λx0 ⇒ Y ≤ Z. r

(39)

Now we conclude that conditions (34) for the parameters of mixtures guarantee that the mixtures are ordered in the failure rate as in (35).



348

5

I. Peshkova et al.

Comparison of Multiserver Systems with Different Service Distributions

In this section, we demonstrate how the failure rate comparison allows to stochastically compare the steady-state performance of the multiserver queueing systems with the infinite buffers and a renewal input flow. We consider two queueing systems, denoted by Σ (1) and Σ (2) , with the same number N servers working in parallel. (In what follows, the superscript (i) denotes the number of the system.) The service discipline is assumed to be First-Come-First-Served. We (i) (i) denote by Sn the service time of customer n, and by tn his arrival instant. The sequence of the independent identically distributed (iid) interarrival times (i) (i) (i) (i) τn = tn+1 − tn , n ≥ 1, and the sequence of the iid service times {Sn , n ≥ 1} (i) are assumed to be independent, i = 1, 2. Denote S the generic service time, and τ (i) the generic interarrival time, i = 1, 2. Now we compare the steady-state queue-size processes in the systems Σ (1) and Σ (2) . At the arrival instant of cus(i) (i) tomer n in in the system Σ (i) , denote by νn the number of customers, by Qn (i) the queue size and by Wn the waiting time of this customer. Denote, when exists, the limits (in distribution) Qn(i) ⇒ Q(i) , νn(i) ⇒ ν (i) , Wn(i) ⇒ W (i) , n → ∞, i = 1, 2. These limits exists, in particular, when the interarrival times τ (i) , i = 1, 2 are non-lattice and the following negative drift assumption holds [2]: ES (i) < N Eτ (i) .

(40)

The following statement, which is a modification of Theorem 5 from [20], contains conditions implying ordering of the queue sizes in the infinite buffer systems. Theorem 5. Assume the following conditions hold in the queueing systems: (1)

ν1

(2)

= ν1 st

= 0, τ (1) = τ (2) , S (1) ≤ S (2) . st

r

(41)

Then, with probability 1 (w.p.1), (2) (1) (2) νn(1) ≤ νn(2) , Q(1) n ≤ Qn , Wn ≤ Wn , n ≥ 1.

(42)

It is worth mentioning that, indeed the stochastic ordering of service times in (41) is sufficient for inequalities (42) . (Indeed we use a coupling to obtain ordering (42) w.p.1.) From this point of view, the failure rate ordering seems to be rather restrictive. However, for the most of distributions the failure rate comparison can be expressed as an explicit relation between given parameters, which allows to compare the performance indexes in the systems with different (mixture) distributions of the interarrival and/or service times. To simulate and compare the described above multiserver systems, we apply the well-developed regenerative simulation, which is a powerful and efficient method of the output analysis of complex queueing systems. We note that our systems are regenerative. A detailed analysis of the regenerative method can be found in the following basic works [2,3,8,15–17].

On Comparison of Multiserver Systems

6

349

Numerical Examples

In this section we illustrate, by the numerical simulation, the comparison results obtained for the multiserver systems in Sects. 4 and 5. Denote by Σ the original system with Exponential-Pareto (mixture) service times with parameters λ, α, x0 , p. Then we construct two new systems Σ (1) and Σ (2) . The system Σ (1) has two-component Hyperexponential service times S (1) , with parameters λ1 , λ2 , p, and the system Σ (2) has two-component Pareto service times S (2) , with parameters α1 , α2 , x0 , p. The Poisson input flow with parameter λτ is the same in all three systems. It follows from results, obtained in Sects. 4 and 5, that, under condition (34), the following ordering between the basic performance indexes must take place: (2) (1) (2) Q(1) n ≤ Qn ≤ Qn , Wn ≤ Wn ≤ Wn , n ≥ 1.

1.0

1.5

2.0

2−component Mixture Pareto Exponential−Pareto Mixture Hyperexponential

0.0

0.5

Mean queue size

2.5

3.0

(43)

1000

2000

5000

10000

20000

Number of arrivals

Fig. 1. The confidence intervals for the mean queue size in the systems Σ, Σ (1) , Σ (2) , N = N 1 = N2 = 4

Figure 1 demonstrates the confidence interval bounds for the mean queue size in the basic system Σ with Exponential-Pareto service time with parameters: p = 0.5, x0 = 0.5, λ = 7, α = 3, x0 = 0.5.

(44)

It follows from (43) that Σ (1) is minorant system for Σ and Σ (2) is majorant system for Σ. We compare regenerative simulation results for all three systems. We take the Hyperexponential service time with parameters λ1 =

I. Peshkova et al. 0.5

350

0.3 0.2 0.0

0.1

Mean queue size

0.4

2−component Mixture Pareto Exponential−Pareto Mixture Hyperexponential

1000

2000

5000

10000

20000

Number of arrivals

Fig. 2. The confidence intervals for the mean queue size in the systems Σ, Σ (1) , Σ (2) , N = 3, N1 = 2, N2 = 6.

7.5, λ2 = 8, p = 0.5, the two-component Pareto service times with parameters α1 = 2.1, α2 = 2.3, x0 = 0.5, p = 0.5. Also we use the input rate λτ = 10 and number of servers N = 4 in all systems. The previous experiment is based on the correct monotonicity results from Theorem 5 which indeed holds if the number of servers are the same in all systems we compare [20]. In two next experiments we show that it is possible to construct more tight confidence bounds allowing different number of servers but keeping the value of the ratio ES (i) /N (load per server) the same in all three systems. Although this is an approximation but Fig. 2 shows that it gives more tight confidence interval for the mean queue size in the system Σ with N = 3 servers and parameters defined in (44). In the system Σ (1) , the number of servers N1 = 2 and the (Hyperexponential) service times have parameters λ1 = 8.5, λ2 = 9, p = 0.5. In the system Σ (2) , the number of servers N2 = 6 and (two-component Pareto) service times have parameters α1 = 2.1, α2 = 2.5, x0 = 0.5, p = 0.5. The input rate is λτ = 10 in all systems. We stress that in both experiments the selected parameters of the service time distributions satisfy the failure rate ordering. Figure 3 demonstrates the confidence intervals (also obtained by regenerative simulation) for the mean queue size in the system Σ with parameters p = 0.5, x0 = 0.5 and λ = 5.1, α = 2, x0 = 0.5, cf. (44), for the system Σ (1) with parameters λ1 = 6, λ2 = 5.7, p = 0.5, and for the system Σ (2) with parameters α1 = 2.5, α2 = 1.9, x0 = 0.5, p = 0.5. We use the input rate λτ = 10 in all systems, and the number of servers (in an evident notation) N1 = 2, N = 4, N2 = 5. We again note that the selected parameters satisfy conditions (27) and (28) which imply stochastic ordering of the service times.

351

7

On Comparison of Multiserver Systems

5 4 3 2 0

1

Mean queue size

6

2−component Mixture Pareto Exponential−Pareto Mixture Hyperexponential

1000

2000

5000

10000

20000

Number of arrivals

Fig. 3. The confidence intervals for the mean queue size in the systems Σ, Σ (1) , Σ (2) , N = 4, N1 = 2, N2 = 5.

7

Conclusion

In this paper, we study the applicability the failure rate comparison of the steadystate performance measures in the multiserver system with two-component mixture distributions. We demonstrate a few refined monotonicity results for the systems in which the properties of service time distributions imply specific monotonicity properties of the failure rate functions. Some numerical results based on regenerative simulation are presented. The obtained results may be useful for the estimation, by the regenerative simulation, the performance indexes for a wide class of the queueing systems with two-component mixture distributions of service time.

References 1. Amini-Seresht, E., Zhang, Y.: Stochastic comparisons on two finite mixture models. Oper. Res. Lett. 45, 475–480 (2017). https://doi.org/10.1016/j.orl.2017.07.009 2. Asmussen, S.: Applied Probability and Queues, vol. 2, p. 439. Springer, New York (2003). https://doi.org/10.1007/b97236 3. Asmussen, S., Glynn, P.: Stochastic Simulation: Algorithms and Analysis, p. 476. Springer, New York (2007). https://doi.org/10.1007/978-0-387-69033-9 4. Aven, T., Jensen, U.: Stochastic Models in Reliability, p. 297. Springer, New York (2013). https://doi.org/10.1007/978-1-4614-7894-2 5. Al-Hussaini, E.K., Sultan, K.S.: Reliability and hazard based on finite mixture models. In: Handbook of Statistics. Advances in Reliability, vol. 20, pp. 139–183 (2001). https://doi.org/10.1016/S0169-7161(01)20007-8

352

I. Peshkova et al.

6. Mclachlan, G. I., Peel D.: Finite Mixture Models. Wiley Series in Probability and Statistics. Applied Probability and Statistics Section, p. 439 (2001). https://doi. org/10.1002/0471721182 7. Marshall, A., Olkin, I.: Life Distributions: Structure of Nonparametric, Semiparametric, and Parametric Families, p. 783. Springer, New York (2007). https://doi. org/10.1007/978-0-387-68477-2 8. Morozov, E.: An extended regenerative structure and queueing network simulation. Department of Mathematics, Chalmers University, Gothenburg, Sweden (1995). Preprint No 1995–08/ISSN 0347–2809 9. Morozov, E., Peshkova, I., Rumyantsev, A.: On failure rate comparison of finite multiserver systems. In: Vishnevskiy, V.M., Samouylov, K.E., Kozyrev, D.V. (eds.) DCCN 2019. LNCS, vol. 11965, pp. 419–431. Springer, Cham (2019). https://doi. org/10.1007/978-3-030-36614-8 32 10. Morozov, E., Nekrasova, R., Peshkova, I., Rumyantsev, A.: A regeneration-based estimation of high performance multiserver systems. Commun. Comput. Inf. Sci. 608, 271–282 (2016). https://doi.org/10.1007/978-3-319-39207-3 24 11. Morozov, E., Peshkova, I., Rumyantsev, A.: On Regenerative Envelopes for Cluster Model Simulation. In: Vishnevskiy, V.M., Samouylov, K.E., Kozyrev, D.V. (eds.) DCCN 2016. CCIS, vol. 678, pp. 222–230. Springer, Cham (2016). https://doi.org/ 10.1007/978-3-319-51917-3 20 12. Peshkova, I., Morozov, E., Maltseva, M.: On comparison of multiserver systems with Exponential-Pareto mixture distribution. Comput. Netw. 1231, 141–152 (2020). https://doi.org/10.1007/978-3-030-50719-0 11 13. Ross, S., Shanthikumar, J., Zhu, Z.: On increasing-failure-rate random variables. J. Appl. Probab. 42, 797–809 (2005). https://doi.org/10.1239/jap/1127322028 14. Shaked, M., Spizzichino, F.: Chap. 6. Mixtures and monotonicity of failure rate functions. In: Handbook of Statistics, vol. 2, pp. 185–198 (2001). https://doi.org/ 10.1016/S0169-7161(01)20008-X 15. Shedler, G.S.: Regeneration and Networks of Queues. Springer, New York (1987). https://doi.org/10.1007/978-1-4612-1050-4 16. Shedler, G.S.: Regenerative Stochastic Simulation, p. 400. Academic Press Inc. (1992). https://www.elsevier.com/books/regenerative-stochastic-simulation/ shedler/978-0-08-092572-1 17. Sigman, K., Wolff, R.W.: A review of regenerative processes. SIAM Rev. 35, 269– 288 (1993). https://doi.org/10.1137/1035046 18. Sonderman, D.: Comparing multi-server queues with finite waiting rooms, I: same number of servers. Adv. Appl. Probab. 11, 439–447 (1979). https://doi.org/10. 2307/1426848 19. Sonderman, D.: Comparing multi-server queues with finite waiting rooms, II:different number of servers. Adv. Appl. Probab. 11(2), 448–455 (1979). https:// doi.org/10.2307/1426849 20. Whitt, W.: Comparing counting processes and queues. Adv. Appl. Probab. 13(1), 207–220 (1981). https://doi.org/10.2307/1426475

On Splitting Scenarios for Effective Simulation of Reliability Models Alexandra Borodina1,2(B) 1

and Vitaliy Tishenko2

Institute of Applied Mathematical Research of the Karelian Research Centre of RAS, Petrozavodsk, Russia [email protected] 2 Petrozavodsk State University, Petrozavodsk, Russia [email protected], [email protected]

Abstract. This article discusses split-based simulation algorithms for the reliability analysis of systems with rare failures. We consider a regenerative degradation process with independent increments, where a twolevel management policy is introduced. The evaluation of the failure probability and other characteristics of the regeneration cycle is critical for optimal control of such systems. However, real degradation processes are usually described by rather complicated models, for which it is difficult to obtain any analytics or heuristic solutions. Accelerated simulation techniques provide a more efficient way to investigate models associated with rare events than the naive Monte Carlo method. The paper considers two scenarios for constructing regeneration cycles using the splitting procedure. One algorithm uses splits at degradation stages of the process and is a nested procedure that runs after the stage when failure becomes possible. Another algorithm implements splitting at levels that are calculated adaptively from the value of the total time spent in the degradation stages. For both scenarios, a series of experiments were performed and both algorithms were compared with the naive Monte Carlo method. In the case of exponential degradation stages, the estimates were compared with the analytical solution. The key criteria for comparing the effectiveness of the methods were the simulation time, the relative error, and the relative experimental error. Moreover, the questions of the efficiency of the optimal choice of levels and the number of splits were investigated. Keywords: Failure probability · Reliability analysis · Degradation process · Regenerative splitting · Speed-up simulation · Relative error

1

Introduction

Analysis of degradation and shock multi-stage processes is a key step in the development and implementation of modern highly reliable technologies. It is The study was carried out under state order to the Karelian Research Centre of the Russian Academy of Sciences (Institute of Applied Mathematical Research KarRC RAS) and supported by the Russian Foundation for Basic Research, project 18-0700187. c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 353–366, 2020. https://doi.org/10.1007/978-3-030-66242-4_28

354

A. Borodina and V. Tishenko

quite expected that the emergence of new models forces to modernize research methods for shock models with changing degradation rate, with soft and hard failures with a natural or predetermined threshold level, which is generally a random variable [9,14]. In particular, effective methods for calculating the realistic model parameters and system reliability are in demand. Nevertheless, the naive Monte Carlo method is still popular in a large number of modern works, despite its well-known inefficiency, for example, see [6,7,11,17]. For instance, as it proposed in [15], a standard solution is based on the stationary distribution of the built-in Markov chain for the simplest cases. Then, for the generalized model, Monte Carlo simulation is used to approximate the cost of maintenance. Nevertheless, the models become more complex, and analytical methods are less available. In particular, the Wiener process with independent and normally distributed increments is widely used for non-monotonic degradation. The Gamma process is useful in the stochastic modeling of monotonic and gradual degradation, characterized by the sequence of tiny increments, such as wear, fatigue, corrosion, crack growth, erosion, consumption, degrading health index. In addition, more complex models of two-stage or multi-stage degradation include Gamma-Gamma, Wiener-Wiener, Gamma-Wiener degradation models are also considered (for example, see [10,16]). In this regard, we suggest looking for more effective alternatives for the naive simulation method that can be used to analyze the reliability of modern systems. For a homogeneous case of exponential degradation stages of the system with gradual and instantaneous failures, analytical formulas were obtained and an advanced simulation technique was proposed in [3]. In [2] a heterogeneous degradation process was investigated analytically for exponential stages. Numerical experiments confirmed that using the standard Monte Carlo method impairs the accuracy of the probability estimates and other characteristics of the degradation process. In [1] the variance reduction technique has been extended to estimate the failure probability that a random sum exceeds a random variable V . In [4] a variance reduction technique using a special variant of conditional Monte Carlo approach proposed for heterogeneous degradation process. It was shown by numerical examples that relative error is bounded and even is vanishing when the degradation stage has heavy-tailed distribution. On the other hand, our experiments show that this method has not an advantage for the light-tailed stages. A variance reduction technique based on the Importance sampling with an exponential change of measure for light-tailed degradation stages was introduced in [5]. All these techniques were tested on a model of the degradation process, which describes the thickness of the anti-corrosion coating and is described in [3]. Since it is possible to obtain analytical results in the simplest cases, this model is convenient for analyzing the effectiveness of accelerated simulation and variance reducing methods. In addition, the process has a regenerative structure, which is typical for degradation models. The proposed accelerated algorithm can also

On Splitting Scenarios for Effective Simulation of Reliability Models

355

be extended for more complex models by replacing the procedure of simulation the time spent at the degradation stages.

2

Crude Simulation of the Degradation Process

Following [3] consider the degradation process X := {X(t), t ≥ 0} with a finite state space E = {0, 1, . . . , L, . . . , M, . . . , K; F } describing the degradation stages of the system. Two-threshold policy (K, L) is considered, which means that the system is restored in the stage K and then proceeds to stage L (see Fig. 1a). Let Ti be the transition time from i to i + 1 stage. Random variables (r.v.) Ti are independent but not necessarily identically distributed. Note that Si,j :=

j−1 

Tk ,

0 ≤ i ≤ K − 1, j > i,

k=i

is the transition time from state j to state i. We define the following distribution functions (d.f.): Fi (t) = P(Ti ≤ t); FV (t) = P(V ≤ t);

(1)

FUF (t) = P(UF ≤ t); FUK,L (t) = P(UK,L ≤ t);  t Fi,j (t) = P(Si j ≤ t) = Fi, j−1 ∗ Fj (t) = Fi, j−1 (t − v)dFj (v);

(2) (3)

0−

Fi,i+1 (t) = Fi (t),

Fi,i (t) ≡ 0,

(4)

where ∗ means convolution. Starting in state X(0) = 0 the process successively passes K −1 intermediate degradation stages and reaches the state M . We denote by V a random time after which a failure can occur. Thus, after the stage M either event {SM,K ≥ V } (instantaneous failure) may happen during a random period V , or event {SM,K < V } (starting the preventive repair stage) occurs during the time K−1  SM,K = Ti . i=M

The process X is strongly regenerative with moments τn+1 = inf{Zi > τn : X(Zi+ ) = M }, n ≥ 0, τ0 := 0, where Zk is the the hitting time of the stage k ≥ 1, and cycle lengths Yk = τk+1 − τk , k ≥ 1 are i.i.d. There are two types of regeneration cycles for degradation process: with and without failure (see the illustration Fig. 1a)  YF = V + UF + S0,M , if SM,K ≥ V Y = (5) YN F = SM,K + UK,L + SL,M , if SM,K < V,

356

A. Borodina and V. Tishenko

M −1 where r.v. V , UF , S0,M = i=0 Ti with known distributions are independent as M −1 well as r.v. SM,K , UK,L , SL,M = i=L Ti After failure and repair, the process returns to the initial state 0. Thus (unconditional) regeneration cycle length Y can be written as Y = YF · I{V ≤SM,K } + YN F · I{SM,K t|X(0) = 0], t ≥ 0, where T stands for the lifetime of the system. Note that, for more complex shock models simulation allows us to estimate parameters of the model like the damage threshold, the intensity of random shock, critical shock inter-arrival time, scale, and shape parameters in Gamma models, etc. If the failure is not a rare event and it is easy to simulate the r.v. V , UF , S0,M , SM,K , UK,L , SL,M on a computer and the performance function is computationally inexpensive to construct the regeneration cycles, then the pF and other characteristics of degradation process can be approximated by crude Monte Carlo unbiased estimators. However, for highly reliable systems, such an assumption seems to be naive.

On Splitting Scenarios for Effective Simulation of Reliability Models

3

357

Splitting Scenarios for the Degradation Process

The splitting procedure for a homogeneous degradation process was firstly proposed in [3], where the method showed the effectiveness of the estimation for exponential degradation stages. Denote {li }, {Ri }, i ≥ 0 the sequence of levels and the corresponding factors. After crossing the level li , the trajectory is split (produces independent copies) into Ri trajectories, which further develop independently. Taking into account the generalization of the method for other models, let’s now compare two possible splitting scenarios: a) the process splits at each degradation stage i ∈ [M, K − 1] (Fig. 1a); b) the levels of splitting li depend on the value of the accumulated amount of time SM,K (Fig. 1b), their total number is determined by the pilot run. In the first case a), it is impossible to go through several levels of splitting, while in the second b), the trajectory of the process can cross several trajectories at once in one step during event simulation. In both cases, the splitting of the trajectories occurs only in the area after stage M , when instantaneous failure becomes possible. Unlike processes with negative drift (which is typical for problems of evaluating rare events), it is impossible to perform optimal leveling due to the randomness of the threshold time to failure V for the degradation process. However, all methods for rare events probabilities simulation are designed to solve problems with a constant value of failure threshold [12,13]. For the standard splitting procedure, an optimal distance between thresholds {li } and splitting factors {Ri } at each threshold are defined by the pilot run [12]. The pilot run defines threshold partition in accordance with the requirement that conditional probabilities of transition between thresholds pi is not so rare but gives the biased estimator itself. From the point of view of the regeneration theory, the problem of rare event probability (and other characteristics of the process) estimating can be reduced to the problem of constructing regeneration cycles using the accelerated simulation technique. In comparison with the naive Monte Carlo method, the splitting method will allow building regeneration cycles much faster. Yet, it should be noted that the cycles constructed in this way cannot be considered independent. Recall that, as it was proposed in [3], to speed-up the simulation procedure of waiting for a rare system failure, we introduce the embedded splitting procedure. The splitting started strictly in regeneration moments τi after which an instantaneous failure becomes possible, see Fig. 1. Further, we will use splitting only in the region between stages M and K and construct a mathematical model of cycles based on the branching process. 3.1

Fully Branching Regeneration Splitting - Scenario a)

The first scheme a) employs fully branching regeneration, where the splitting levels li are fixed and strictly correspond to the degradation stages. For this

358

A. Borodina and V. Tishenko

reason, initially, we cannot change the partition into levels. Thus, it is impossible to influence the estimation variance by optimizing the levels, unlike the standard splitting method. However, this algorithm is the easiest to implement regardless of the choice of programming language. Besides, given the artificial branching of the process, it is necessary to take into account the dependency between cycles. At each level, we generate Ri copies of r.v. Ti , M ≤ i ≤ K − 1. So, each original path generates D = RM · · · RK−1 subpaths called group of cycles. Each process trajectory started from the initial threshold lM gives the group of D dependable regeneration cycles. The cycles from different groups are independent by construction. The total number of groups is RM −1 . The dependence is generated by the same pre-history of the random sum SM K realizations before the splitting point at each stage. For convenience, we will assume that after the moment of splitting at the level li , i ∈ [M + 1, K − 1], all Ri trajectories of brunching degradation process X ∗ develop simultaneously. (This can be realistic if the algorithms are implemented using parallel programming tools.) Let us consider in detail the construction of traditional regenerative cycles from the first group X1∗ generated by the first trajectory starting from the stage M − 1. For the remaining groups Xi∗ , i ∈ [2, RM −1 ], the reasoning is similar. Let’s introduce the following notation: gi - generation of li , i ∈ [M, K − 1] threshold; ni - the number of trajectories starting from the level li−1 and reaching the level li , i ∈ [M + 1, K − 1], nM = RM −1 ; N ∗ - the maximum stage number reached by the trajectories before the failure (if it occurs) N ∗ = max{i : ni > 0, i ∈ [M, K − 1]}; (i) tki - the splitting moment of the bunch number ki ∈ [1, ni ] at the level li , i ∈ [M + 1, K − 1]; (i) Hki ,j (t) - accumulated time spent in degradation stages at time t by jth process (i)

copy that started from li threshold at the moment tki ; (i) ηki ,j - the instantaneous failure moment for jth copy of the process after the hitting li threshold; (i+1) Zki ,j - the moment of the next event, namely, either a transition to the next stage or a failure occur at the level li . We can conclude that (i)

(i)

Hki ,j (tki ) =

i−1 

Tp , i ≥ M + 1;

(8)

p=M (i)

(i)

(i)

ηki ,j = min{t > tki : Hki ,j (t) ≥ V }; (i+1)

(i)

tki ,j = tki + Ti,j , Ti,j = (i+1) Zki ,j

=

(i) (i+1) min{ηki ,j , tki ,j }.

st Ti

∼ Fi ;

(9) (10) (11)

On Splitting Scenarios for Effective Simulation of Reliability Models

359

We’ll say that the trajectory belongs to the generation gi if it started from a level li and either reached the level li+1 or the failure occurred, so denote: (i)

gi = {Hki ,j , j ≥ M }, (i)

(i)

(12)

(i)

(i+1)

Hki ,j = {Hki ,j (t), tki ≤ t ≤ Zki ,j }.

(13)

Recall that D cycles in each group Xi∗ , i ∈ [1, RM −1 ] will be formed from trajectories that met failure at one of the levels (cycles with the failure YF ), or reached stage K (cycles without failure YN F ). Below we give an algorithm for sequentially constructing cycles in the group X1∗ assuming that nM +1 > 0. The output of the Algorithm 1 is the set of cycles in first group ∗ X1∗ = {G(M ) , . . . , G(N ) }.

Remark 1. As a rule, for degradation models with rare failures, it is most often performed that N ∗ = K − 1 and thus splitting occurs at each stage of degradation, therefore this algorithm becomes fully branching. Further, each group must be supplemented to a completed regeneration cycle according to the type of cycle (6) by simulation. Thus, each set of cycles G(i) has its own tail of the regeneration cycle. The proposed Algorithm 1 is started RM −1 times at regeneration moments τi . The cycles from different groups Xi∗ are independent, but the trajectories in one group cycles have a construction dependency. Then, the total number of the failures in the ith group is Ai =

i·D 

I (j) , i = 1, . . . , RM −1 ,

j=(i−1)·D+1

where I (j) = 1 for the cycle with failure (I (j) = 0, otherwise). Sequence {I (j) , j ≥ 1} is discrete D-dependent regenerative with constant cycle length D and regeneration instants are {i · D}, i ∈ [1, RM −1 ]. Remark 2. Note that constructing trajectories according to the algorithm is necessary for estimating performance measures such as the mean life-time ET , the average length of the cycles EY , EYF , the reliability function R(t), etc. If it is required to estimate only the failure probability, then the regeneration cycle can be represented by an indicator, and the Algorithm 1 can be simplified. Moreover, the regenerative interpretation is successful in terms of interval estimation. The regenerative structure gives the following unbiased and strongly consistent estimator pF : RM −1

E Aj → pF = RM −1 · D j=1

D j=1

D

I (j)

= pF

(15)

360

A. Borodina and V. Tishenko

Algorithm 1. Algorithm for sequential design of degradation trajectories 1: Draw an i.i.d. RM -sample TM,j , j ∈ [1, RM ] from df FM and V ∼ FV . Denote the next(M +1)

(M )

= TM,j , the failure time ηj

stage time tj (M ) Zj

(M )

= V . Let Hj

(M ) (M +1) = min{ηj , tj }, where index j means the ordinal the generation gM ; (M ) (M +1) Compute nM +1 = #{j : Zj = tj , j ∈ [1, RM ]}; ∗ N ← M + 1;

(M +1)

= tj

until time

number of the trajectory in

2: 3: 4: i ← M + 1; 5: nM ← 1; 6: while i ≤ N ∗ and i < K do 7: Draw an i.i.d. Ri -sample Ti,j , j ∈ [1, ni Ri ] from df FM and V ∼ FV . Draw the (i)

(i)

trajectories Hk ,j , ki ∈ [1, ni ], j ∈ [1, ni Ri ] after time tk . Add common pre-history to i i the next generation (i) (t) i ,j

Hk

8:

(i) i ,j

(i)

=

(i) tk i

+ Ti,j , Ti,j =st Ti ∼ Fi ; (i) (i+1) , tk ,j }, i ,j i

Define the trajectories of generation gi (their number is ni Ri ) (i) i ,j

14:

≥ V }, ki ∈ [1, ni ], j ∈ [1, ni Ri ];

= min{ηk

Hk

13:

i

(i) (t) i ,j

i

(i+1) Zk ,j i

11: 12:

(i)

(t), τ1 ≤ t ≤ tk , ki ∈ [1, ni ]

= min{t > tk : Hk

(i+1) tk ,j i

10:

i

. Denote the failure time, next-stage time and choose the next event-time: ηk

9:

(i−1)

≡ Hk

(i) (t), τ1 i ,j

= {Hk

(i+1) , i ,j

≤ t ≤ Zk

j ∈ [1, ni Ri ]} (i)

(i)

(i+1)

(i+1)

Omit the index ki for gi -trajectories and use notation Hj , ηj , tj , Zj for all j ∈ [1, ni Ri ]. (i+1) (i+1) Compute ni+1 = #{j : Zj = tj , j ∈ [1, ni Ri ]}; Reorder the trajectories and assign numbers [1, ni Ri − ni+1 ] to the paths with the failure at the stage li , and numbers (ni Ri − ni+1 , ni Ri ] to the paths without failure. For every j : Z (i+1) = η (i)j generate Di = Ri+1 · · · RK−1 stochastically identical paths (i) (i) Gj,d =st Hj , d ∈ [1, Di ]. Define the paths from generation gi (i)

G(i) = {Gj,d , j ∈ [1, ni Ri − ni+1 ], d ∈ [1, Di ]}

(14)

15: if ni+1 > 0 and i < K − 1 then 16: N∗ ← i + 1 17: end if 18: i←i+1 19: end while 20: if N ∗ = K − 1 then (K−1) 21: there are nK cycles without failure. Every path Hk generates the only trajectory K−1 ,j in stage N ∗ , kK−1 ∈ [1, nK−1 ], j ∈ [1, nK−1 RK−1 ]. So, the paths from gK−1 are: (K−1)

G(K−1) = {Gj,d

(K−1) ,j K−1 ,j

≡ Hk

22: else ∗ 23: define G(N ) as in formula (14) 24: end if

∈ [1, nK−1 RK−1 − nK ], d ∈ [1, DK−1 ]}

On Splitting Scenarios for Effective Simulation of Reliability Models

361

as RM −1 → ∞ w.p.1. The following 100(1−δ)% confidence interval for pF based on the regenerative variant of Central Limit Theorem, that is well known from [8] √  z(δ) vn  pF ± √ (16) n where quantile z(δ) satisfies P[N (0, 1) ≤ z(δ)] = 1 − δ/2, and n 2 n−1 i=1 [Ai − p F D] vn = D2

(17)

is a weakly consistent estimator of σ 2 = E[A1 − pF D]2 /D2 if E(A1 − γα1 )2 < ∞. Under moment assumptions, EA21 < ∞, the estimate (17) is strongly consistent. 3.2

Standard Splitting Procedure - Scenario b)

Another splitting scenario can be proposed based on the standard splitting method [12,13]. Recall that in standard spitting procedure the state space E of process is divided into M + 1 nested subsets Ci , which defined by importance function f : Ci = {x ∈ E | f (x) ≥ li }, i ∈ [1, M + 1]. For the degradation process the splitting levels li selected according to the value of SM,K , see the illustration in Fig. 1b), so the cumulative residence time in the degradation stages is chosen as importance function f . Since the standard algorithm arranges the levels {li } based on the fixed value (level lM +1 = l), it is proposed to use the expectation value EV as a threshold value instead of r.v. V . Denote the following notation for conditional probabilities of reaching the next level i + 1 while being at the current level i: p1 = P(C1 ), . . . , pi+1 = P(Ci+1 |Ci ), i ∈ [1, M ]. Thus, the standard point estimator pF given by splitting scenario b) is pˆF =

M +1

i=1

pˆi =

M nM +1 1 nM +1 , = R0 i=1 Ri R0 D

(18)

where pi is the estimate of transition probability pi , Ri is the splitting factor, nM +1 is the number of failures, R0 is the number of simulation starts. It is known that the splitting simulation effort is defined as follows: M +1  i=1

Ri E[ni−1 ] = R0

M +1  i=1

i 1

pj R j , pi j=1

(19)

where ni is the number of reaching the level li . It is optimal if the number of branching trajectories does not grow exponentially on the one hand and the process is not damped on the other. It is obvious that the case pj Rj > 1 implies

362

A. Borodina and V. Tishenko

the explosion of the algorithm effort, the case pj Rj < 1 gives nM +1 = 0 with high probability, and the case Rj = 1/pj is optimal. Thus, the optimal values pi , but for the degradation process, for simulation are related by the ratio Ri = 1/ it should be expected that pi ≈ 1. Thus, the optimal option is not suitable for accumulation processes and does not give an effect. Generally an optimal levels {li } and optimal splitting factors {Ri } at each threshold determined from the so-called adaptive pilot run of splitting procedure (for instance, see [12]). Pilot run gives biased estimator but defines threshold partition according to requirement that pi is not rare event probabilities. Thus, the input parameters to the adaptive algorithm include sample size N , pi = p ∈ (0, 1), fixed level lM +1 = l and importance function f (x). The key points are: 1. to get the optimal levels li = min(lM +1 , lˆi ), where lˆi =

N 1  I[f (Xi ) ≥ l] ≤ p l∈{f (X1 ),...,f (XN )} N i=1

arg min

2. to get the splitting factors Ri = Ber(p) +

N  ni

. Due to the randomness of the parameter V the adaptive pilot run for average level system, where l = E[V ] was applied to calculate thresholds li and factors Ri . Remark 3. In addition, the degradation process due to arbitrary increments can cross several levels at once, so the following splitting condition was introduced: if any trajectory starting from level li crossed some level li+k , i + k ≤ M + 1, k then it splits into j=1 Ri+j copies.

4

Simulation Results

An experimental comparison of two splitting scenarios was made with respect to the following evaluation quality criteria: relative error RE and relative experimental error RER (if pF is analytically available)  V ar[ pF ] RE[ pF ] = , RER[ pF ] = |pˆF − pF | · 100/pF . E[ˆ pF ] To estimate the variance, samples of 100 values were constructed. The tables show the average computation time for one sample element. In some cases, Monte Carlo estimation for probabilities less than 10−7 was too long to be complete. An invariant for comparing the three algorithms MC, RSa) and RSb) is to construct the same number n of cycles.

On Splitting Scenarios for Effective Simulation of Reliability Models

363

All numerical tests were executed on ultrabook HP ENVY Intel(R) Core(TM) i3 7100U 2.4 GHz processor with 4 GB of RAM, running Windows 10. Tables 1, 2, and 3 show the results of running a programs in Python3 and C++ for the Monte Carlo method (MC) and the regenerative splitting method (RS) for a) and b) scenarios. Table 1. Time (s) estimator: MC vs. RSa) and RSb) : Tj ∼ Exp(λj ), V ∼ Exp(ν) λK−1 , s

n

3

pF 4

10 , 50

10

tM C −3

8.75 · 10

tRSa) tRSb)

0.318 0.019 0.228

104 , 5 · 102 104 8.79 · 10−4 0.312 0.018 0.222 105 , 5 · 103 105 8.79 · 10−5 3.06

0.180 2.16

106 , 5 · 104 107 8.79 · 10−6 253

17.4

218

Table 2. RER estimator: MC vs. RSa) and RSb) : Tj ∼ Exp(λj ), V ∼ Exp(ν) λK−1 , s

n

3

pF 4

10 , 50

10

RERM C RERRSa) RERRSb) −3

8.75 · 10

3.02

2.06

3.91

104 , 5 · 102 104 8.79 · 10−4 4.59

3.46

4.17

2.85

4.43

1.46

106 , 5 · 104 107 8.79 · 10−6 0.79

1.23

4.79

5

3

10 , 5 · 10

5

10

−5

8.79 · 10

Table 3. RE estimator: MC vs. RSa) and RSb) : Tj ∼ Exp(λj ), V ∼ Exp(ν) λK−1 , s

n

3

pF 4

10 , 50

8.75 · 10

0.18

3.02

1.5

104 , 5 · 102 104 8.79 · 10−4 0.36

2.16

4.60

0.31

3.23

4.65

106 , 5 · 104 107 8.79 · 10−6 0.11

4.75

1.53

5

10

REM C RERSa) RERSb) −3

3

10 , 5 · 10

5

10

−5

8.79 · 10

Let’s fix the parameters of the model ν = 0.5, μF = 1.5, μ = 2, L = 1, M = 5, K = 17. To observe both RE and RER values we give an example of exponential degradation periods Tj ∼ Exp(λj ) for the heterogeneous case where the analytical formulas are known from [2]. So, we will vary number of regeneration cycles n and sequence of values λj = λK−1 − (K − j − 1)s, j ∈ [0, K − 2],

364

A. Borodina and V. Tishenko

where λK−1 will be initialized before starting the splitting procedure, and the other values will be shifted by step s, thus the condition λ0 < · · · < λK−1 , ν < λj , j = [0, K − 1], for increasing the degradation rate is guaranteed. We compare all methods with the same number n of regeneration cycles and track the corresponding time tM C , tRSa) , tRSb) of each method in seconds. The number of cycles n is chosen for practical reasons so that the RER does not exceed 5% for all methods. For variance estimation, a sample of 100 values was constructed. The Table 1 shows that the RSa) algorithm is significantly superior in time to the others MC and RSb) . Despite the higher RE values the RSa) splitting scenario provides a lower RER and is, therefore, closer to the analytical value than RSb) . It should be noted that for the scenario RSb) , cases with a fixed optimal number of splits Ri and a random factors with exponential Ri ∼ Exp(0.33) (RSexp ) and uniform Ri ∼ U ni[1, 5] (RSuni ) were also studied. Table 4. RER and time (s) results for various Ri types: Tj ∼ Exp(λj ), V ∼ Exp(ν) pF

RERM C RERRS RERRSexp RERRSuni tM C tRS −3

8, 79 · 10

tRSexp tRSuni

2.29

3.07

0.7

3.23

0.39 0.11 0.19

0.18

8, 79 · 10−4 0.57

2.82

0.31

0.4

3.48 1.02 1.68

1.68

4.35

2.46

4.08

36.6 10.1 16.2

17.4

0.73



1.33



168

−5

8, 79 · 10

0.34

8, 79 · 10−6 –

108 –

The Table 4 demonstrates the values for comparison RER and time for RSb) algorithm in these cases with MC method. Nevertheless, no significant differences between the types of splitting and MC estimates are observed. That fact shows again that the standard optimal conditions have no effect in the case of the degradation process. Empty spaces in the table mean that the computation time for one element of the sample was too long to build a full sample of size 100. Table 5. RE and time (s) estimator in C++: MC vs. RSa) : Ti ∼ exp(λ), V ∼ Exp(ν) n

pF

tM C

104 8, 79 · 10−4 0.037 5

10

−5

8, 79 · 10

0.389

tRSa) REM C RERSa) 0.010 0.318

2.167

0.095 0.366

3.254

107 8, 79 · 10−6 37.83 6.56 0.125

1.967

108 8, 79 · 10−7 378.0

3.188

25.06 0.166

On Splitting Scenarios for Effective Simulation of Reliability Models

365

The Table 5 shows the results of the algorithm in the C++ language. Expectedly, the running time for the same number of cycles is more comfortable in comparison with the Python language, so that we can calculate the estimate by MC for a lower probability. Note that the MC method gives a smaller RE in some cases. That fact can be explained due to the direct dependence of variance pF on ν and it is rather big here. Table 6. Var and time (s) estimator in C++: MC vs. RSa) and RSb) : Ti ∼ Weibull pˆFM C

pˆFRS

0.156

0.153

a)

pˆFRS

b)

0.155

V arM C

V arRSa)

V arRSb)

tM C

tRSa)

4.24e−09 8.28e−05 3.56e−06 137.7 13.67

tRSb) 89.3

5.43e−03 5.29e−03 5.33e−03 2.38e−10 1.33e−05 7.31e−07 69.64 6.53

25.3

6.43e−05 6.02e−05 6.12e−05 1.29e−12 1.58e−10 4.59e−10 234.9 17.33

210.1



2.07e−07 –



3.99e−15 –

>2 h

628.33 >2 h

In the next example, we try to avoid the influence of the variance r.v. V and assume that it is fixed V = 1/ν. We use ν as a rarity parameter to change the probability value in the experiment. Consider i.i.d Ti = T with light tail Weibull 4 d.f. FT (x) = 1 − e−3x , x ≥ 0. It is difficult to get the analytics for the Weibull degradation stages, so we compare simulation methods with each other. This is clear from Table 6 that it is possible to repeat the observation that splitting at the degradation stages is more beneficial than scenario b).

5

Conclusion

We performed a series of experiments that demonstrated the effectiveness of the two splitting schemes for the accelerated simulation of regeneration cycles and estimation of the degradation process characteristics. Both variants of the splitting procedure were compared with the cycle constructing procedure via naive Monte Carlo method in terms of simulation time, relative error, and relative experimental error estimates. Based on numerical experiments, it can be summarized that the first scenario a) is the most efficient for simulation of the degradation process with rare failures. At the same time, the organization of branching at the moments of transition between the stages of degradation is simpler and more intuitively clear. In addition, it turns out that the choice of the optimal splitting parameters is difficult due to the fact that the time to failure is a random variable. In particular, the use of the optimal splitting rates does not give an effect for processes with independent increments, even compared to the Monte Carlo method.

366

A. Borodina and V. Tishenko

References 1. Borodina, A., Lukashenko, O., Morozov, E.: On conditional Monte Carlo for the failure probability estimation. In: Proceedings of 2018 10th International Congress on Ultra Modern Telecommunications and Control Systems, ICUMT 2018, pp. 202–207. IEEE (2018) 2. Borodina, A., Tishenko, V.: Simulation of a heterogeneous degradation process in a system with gradual and sudden failures. Proc. Karelian Res. Cent. Russ. Acad. Sci. 7, 3–13 (2018). https://doi.org/10.17076/mat836. (in Russian) 3. Borodina, A., Efrosinin, D., Morozov, E.: Application of splitting to failure estimation in controllable degradation system. In: Vishnevskiy, V.M., Samouylov, K.E., Kozyrev, D.V. (eds.) DCCN 2017. CCIS, vol. 700, pp. 217–230. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-66836-9 18 4. Borodina, A., Lukashenko, O., Morozov, E.: A rare-event estimation of heterogeneous degradation process. In: 2019 11th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), pp. 1–6. IEEE (2019) 5. Borodina, A., Lukashenko, O., Morozov, E.: On estimation of rare event probability in degradation process with light-tailed stages. In: Proceedings the 22nd International Conference on Distributed Computer and Communication Networks: Control, Computation, Communications, DCCN 2019, pp. 477–483 (2019) 6. Dong, Q., Cui, L.: A study on stochastic degradation process models under different types of failure thresholds. Reliab. Eng. Syst. Saf. 181, 202–212 (2019) 7. Gao, H., Cui, L., Kong, D.: Reliability analysis for a wiener degradation process model under changing failure thresholds. Reliab. Eng. Syst. Saf. 171, 1–8 (2018) 8. Glynn, P.W., Iglehart, D.L.: Conditions for the applicability of the regenerative method. Manage. Sci. 39(9), 1108–1111 (1993) 9. Jensen, H., Papadimitriou, C.: Reliability analysis of dynamical systems. Substructure Coupling for Dynamic Analysis. LNACM, vol. 89, pp. 69–111. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-12819-7 4 10. Kong, D., Balakrishnan, N., Cui, L.: Two-phase degradation process model with abrupt jump at change point governed by Wiener process. IEEE Trans. Reliab. 66(4), 1345–1360 (2017) 11. Lin, Y.H., Li, Y.F., Zio, E.: A comparison between Monte Carlo simulation and finite-volume scheme for reliability assessment of multi-state physics systems. Reliab. Eng. Syst. Saf. 174, 1–11 (2018) 12. Rubinstein, R.Y., Kroese, D.P.: Simulation and the Monte Carlo Method. Wiley, New Jersey (2017) 13. Rubinstein, R.Y., Ridder, A., Vaisman, R.: Fast Sequential Monte Carlo Methods for Counting and Optimization. Wiley, New Jersey (2014) 14. Shahraki, A., Yadav, O.P., Liao, H.: A review on degradation modelling and its engineering applications. Int. J. Perform. Eng. 13(3), 299–314 (2017) 15. Sun, Q., Ye, Z.S., Zhu, X.: Managing component degradation in series systems for balancing degradation through reallocation and maintenance. IISE Trans. 52(7), 797–810 (2020) 16. Wang, X., Jiang, P., Guo, B., Cheng, Z.: Real-time reliability evaluation for an individual product based on change-point gamma and Wiener process. Qual. Reliab. Eng. Int. 30(4), 513–525 (2014) 17. Yousefi, N., Coit, D.W., Song, S., Feng, Q.: Optimization of on-condition thresholds for a system of degrading components with competing dependent failure processes. Reliab. Eng. Syst. Saf 192, 106547 (2019)

Ergodicity and Polynomial Convergence Rate of Generalized Markov Modulated Poisson Processes Galina Zverkina(B) V. A. Trapeznikov Institute of Control Sciences of Russian Academy of Sciences, 65 Profsoyuznaya street, 117997 Moscow, Russia [email protected] https://www.ipu.ru/ Abstract. Generalization of the Lorden’s inequality is an excellent tool for obtaining strong upper bounds for the convergence rate for various complicated stochastic models. This paper demonstrates a method for obtaining such bounds for some generalization of the Markov modulated Poisson process (MMPP). The proposed method can be applied in the reliability and queuing theory. Keywords: Markov modulated Poisson process · Lorden’s inequality Convergence rate · Strong upper bounds · Coupling method · Successful coupling.

1

·

Introduction

As well-known, a Markov modulated Poisson Process (MMPP) is a Poisson process whose rate varies according to some Markov process. There is some Markov process Xt , and the behaviour of the other process Yt at the time t depends on the state of Xt at this time. Because Poisson process are considered, the processes Xt and Yt are Markov chains in continuous time, obviously. Thus, the “rate” or intensity and transition function of the process Yt depends on the state of Xt . The paired process (Xt , Yt ) is Markov, and it has the constant intensities between the changes of the state of (Xt , Yt ). This is a multidimensional Markov chain in continuous time. Obviously, the processes Xt and Yt are one-dimensional, but they may be multi-dimensional. The behavior of a large class of queueing systems, reliability systems, networks may be described in terms of MMPP under the assumption about exponential distribution of all random variables (r.v.’s). Here, the generalization of MMPP is given; we suppose that random variables in the model can have arbitrary distributions. Moreover, we suppose, that the processes Xt and Yt can be multi-dimensional, and the intensities of everyone components of the paired process (Xt , Yt ) can be depended on everyone. Such a The work is supported by RFBR, project No 20-01-00575A. c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 367–381, 2020. https://doi.org/10.1007/978-3-030-66242-4_29

368

G. Zverkina

process describes a wide class of models of queueing systems, reliability systems, and networks. (1) (2) (3) (n) So, we consider the process Xt = (Xt , Xt , Xt , . . . Xt ), where the pro(i) cesses Xt are one-dimensional Markov chains in continuous time. For simplicity, we suppose that all these Markov chains in continuous time have only one state of embedded Markov chain (i.e. some renewal processes). In other words, the processes are flows of events (not Poisson!). In general, this multidimensional process is non-regenerative. It is well known that in a queuing theory and related disciplines it is very important to establish the ergodicity of the systems, as well as their stationary distribution. Also it is important to know what is the rate of convergence of the distribution of the system to the limit distribution. This is important because when we use some systems in practice, we need to know when the stationary distribution can be used in calculations and for estimations instead of the timevarying distribution of the system. Our aim is to prove the ergodicity of the process Xt under some assumptions (i) about the distributions of random times between the events of all processes Xt .

2

Some Preliminary Considerations

Definition 1 (Regenerative Process). A random process is called regenerative if there exists an increasing sequence {ti }i=0,1,2,... , such, that the random def

elements Θi == {Xt , t ∈ [ti−1 ; ti ]} are i.i.d. ∀ i = 1, 2, . . .. Times ti are named regeneration times. def Denote τi == ti+1 − ti , and let Pt be a distribution of regenerative process at the time t.  It is well-known that: 1. If E τi < C < ∞, then the regenerative process is ergodic, i.e. there exists the probability distribution P, such that Pt =⇒ P. 2. If E (τi )k < ∞, then ∃ K(P0 ) : Pt − PT V ≤

K((k − 1), P0 ) . tk−1

(1)

3. If E exp(ατi ) < ∞, then ∀ β < α ∃ K(P0 , β) : Pt − PT V ≤ K(P0 , β) exp (−βt). These results are the classic results, but they make it impossible to estimate the value K – see, e.g., [1,2,7,19]. The convergence rate can be estimated explicitly in a fairly limited number of cases. These are situations when, for example, in the QS the incoming flow is Poisson, and the service times are distributed exponentially. The same approach is

On Generalized Markov Modulated Poisson Processes

369

applied to the study of reliability for systems consisting of restorable elements: the rate of convergence of the distribution of such a reliability system can be estimated when the work and repair times are exponential (see, e.g., [6]). It is always assumed that all switching (transitions between operating and repair modes) occur instantly. The goal of the present paper is to estimate the convergence rate of the QS distribution, consisting of dependent servers, and the connection of which may be delayed. Previously, such systems were studied using the special Lyapunov function – see, e.g., [16,17]. Note, that the regenerative process have an embedded renewal process, and the bounds of the convergence rate of this renewal process in total variation metrics are also the bounds of the convergence rate of studied regenerative process. This fact is the basis for obtaining strong upper bounds for the convergence rate of regenerative processes. Also, this general method for obtaining an upper bounds for the constant K was invented in [14]. However, special methods are desirable for specific QS. All known upper bounds for the constants for the convergence rate are based on the coupling method, invented in [4]. 2.1

Some Information About the Coupling Method

Consider two independent Markov processes with different initial states X0 and 0 and with the same transition function. Denote these processes by Xt and X t correspondingly. Suppose we can find the time τ where they are coincided. X 0 . After the The time τ is called coupling epoch and it depends on X0 and X   time τ (X0 , X0 ), the distributions of the processes X0 and X0 are coincided by 0 ), and for all set A ∈ σ(X ), P{Xt ∈ Markov property. Thus, for all t ≥ τ (X0 , X t ∈ A}. It implies the basic coupling inequality: A} = P{X t ∈ A}| = |P{Xt ∈ A & τ > t} − P{X t ∈ A & τ > t} |P{Xt ∈ A} − P{X t ∈ A & τ ≤ t}| + |P{Xt ∈ A & τ ≤ t} − P{X t ∈ A & τ > t}| ≤ P{τ > t}. = |P{Xt ∈ A & τ > t} − P{X Then, if it is possible to find the increasing positive function ϕ(τ ) such that 0 )) < ∞, then by Markov inequality, E ϕ(τ (X0 , X 0 ) ≥ t} = P{ϕ(τ (X0 , X 0 )) ≥ ϕ(t)} ≤ P{τ (X0 , X

0 )) E ϕ(τ (X0 , X . ϕ(t)

From the last inequality the bounds for convergence of the distribution Pt can be obtained. Let’s explain it.

370

G. Zverkina

 starts from the stationary distribution P of Xt , i.e. at any If the process X 0 , then t is the same as the one of X time, the distribution of X  0 ))P( d X 0 ) ϕ(τ (X0 , X |P{Xt ∈ A} − P(A)}| ≤

X

ϕ(t)

,

where X is the state space of Xt This schema can be used for discrete Markov chain and for Markov chain in continuous time. But for the process Xt in continuous time, the “direct” coupling 0 , P{τ (X0 , X 0 ) < method is impossible, because for different values X0 = X ∞} = 0. Thus, the modification of coupling method, or successful coupling will be used. 2.2

Successful Coupling (See [8]).

t be two independent Markov processes with the same transition Let Xt and X function, but with different initial states at time t = 0. Suppose that (dependent) processes Yt and Yt are constructed on some probability space, in such a way that: D D  1. Yt = Xt and Yt = X t for all non-random t;

0 ) < ∞} = 1, where τ (X0 , X 0 ) = τ (Y0 , Y0 ) = inf{t > 0 : Yt = Yt }. 2. P{τ (X0 , X This pair of processes Yt and Yt is called successful coupling for the processes 0 ) is called coupling epoch. Xt and Yt , and τ (X0 , X For successful coupling, the basic coupling inequality can be applied as: t ∈ A}| = |P{Yt ∈ A} − P{Yt ∈ A}| |P{Xt ∈ A} − P{X = |P{Yt ∈ A & τ > t} − P{Yt ∈ A & τ > t} + |P{Yt ∈ A & τ ≤ t} − P{Yt ∈ A & τ ≤ t}|

(2)

= |P{Yt ∈ A & τ > t} − P{Yt ∈ A & τ > t}| ≤ P{τ > t} D D  for any set A ∈ σ(X ). Here, identical distribution of pairs Yt = Xt and Yt = X t means that only marginal distributions coincide in any time, but not finitedimensional distributions of these processes. Now, our goal is a construction of the successful coupling and an estimation 0 ). For this construction of polynomial moments of a random variable τ (X0 , X the Basic Coupling Lemma is needed.

On Generalized Markov Modulated Poisson Processes

2.3

371

Basic Coupling Lemma (see, e.g., [13, 18, 20])

Here the simplest formulation of the Basic Coupling Lemma is given. Lemma 1. If the random variable ϑ1 and ϑ2 have c.d.f. Φ1 (s) and Φ2 (s) cordef  respondingly, and their common part κ == min{Φ1 (s), Φ2 (s)} d s > 0, then the R

random variables ϑ1 and ϑ2 can be constructed (on some probability space) such, that D D 2. P{ϑ1 = ϑ2 } = κ.  1. ϑ1 = ϑ1 , ϑ2 = ϑ2 ; The statement of Lemma 1 has been extended to any finite number of random variables. Lemma 2. Let ϑ1 , ϑ2 , . . ., ϑn be the random variable with probability densities def  ϕ1 (s), ϕ2 (s), . . ., ϕn (s) correspondingly, and κ == min {ϕi (s)} d s > 0. R i=1,...,n

Then on some probabilistic space it is possible to construct the random variables ϑ1 (s), ϑ2 (s), . . ., ϑn (s) such that D 2. P{ϑ1 = ϑ2 = . . . = ϑn } = κ.  1. ϑi = ϑi , i = 1, 2, . . . n; Proof. Let κ < 1 (the proof for the case κ = 1 is very simple). Consider a probability space (Ω, σ(Ω), P), where Ω = [0; 1)n+1 = [0; 1)1 × [0; 1)2 × · · · × [0; 1)n+1 , σ(Ω) is its Borel σ-algebra, and P is Lebesgue measure on Ω. Let Ui be the random variable with continuous uniform distribution on [0; 1)i , i = 1, . . . , (n + 1). def Let ϕ(s) == min ϕi (s), and i=1,...,n

def 1 Ψ (s) == κ

s

def Ψi (s) ==

ϕ(u) d u, −∞

1 1−κ

s (ϕi (u) − ϕ(u)) d u. −∞

Ψ and Ψi are the distribution functions. def Put ϑi == Ψi−1 (Ui ) × 1(Un+1 > κ) + Ψ −1 (Ui ) × 1(Un+1 ≤ κ), i = 1, . . . , n. It is easy to see that the random variables ϑi satisfy the conditions 1 and 2 of Lemma 2.  The Lorden’s inequality has been used in [13–15] for coupling method application to find upper bounds of convergence rate for regenerative processes. Now, we need to use some generalization of the Lorden’s inequality.

3

Lorden’s Inequality def

Consider the renewal process Nt ==

∞  i=1

 1

i 

 ξk ≤ t , where {ξ1 , ξ2 , . . .} is the

k=1

of i.i.d. positive random variables. Nt is a counting process that changes its value k  def ξj . The times tk are the renewal times. at the times tk = Sk == j=1

372

G. Zverkina D

ξ1

D

ξ2 = ξ1

D

ξ3 = ξ1

ξ4 = ξ1 .........

t1

t0 = 0

t2

Bt

t

Wt

t3

t4

Fig. 1. Bt is a backward renewal time, and Wt is a forward renewal time at the fixed Nt  time t; Bt = t − ξi . 1

In Fig. 1, we see the backward renewal time (or overshoot) Bt , and the forward renewal time (or undershot) Wt at the fixed time t (See Fig. 1): def

Bt == t − SNt ;

def

Wt == SNt +1 − t.

Theorem 1 (Lorden, G. (1970) [10]; (see, e.g. [3]). Lorden’s inequality states that the expectation of this overshoot is bounded as E Bt ≤

E ξ12 . E ξ1



This inequality is the tool for upper bounds for convergence rate in total variation metrics. However, we need to use some generalization of the Lorden’s inequality. 3.1

Generalized Lorden’s Inequality def

Definition process). Consider the counting process Nt ==  i 2 (Quasi-renewal  ∞   1 ξk ≤ t , where {ξ1 , ξ2 , . . .} are positive random variables is named i=1

k=1

quasi regenerative if the r.v.’s ξi are not i.i.d. As for a classic renewal process, Nt is a counting process that changes its k  def ξj . The times tk are the renewal times.  value at the times tk = Sk == j=1

The generalized Lorden’s inequality estimates the expectation of the backward renewal time of quasi-renewal process – in some condition, naturally. 3.2

Some Preliminary Considerations About Generalized Intensities

The random variables can be defined by distribution function, by its density, and by its intensity. Obviously, the intensity is a means for study the absolutely conF  (x) tinuous distributions, and for d.f. F (x) the intensity is equal λ(x) = . 1 − F (x)

On Generalized Markov Modulated Poisson Processes

373

This formula is correct: ⎛ F (x) = 1 − exp ⎝

x

⎞ −λ(s) d s⎠ .

(3)

0

But we are interested in mixed random variables, i.e. their distribution functions can have jumps.

def If F (a − 0) = F (a + 0), the we put λ(a) == − ln F (a + 0) − F (a − 0) δ(0), where δ(·) is a “classic” δ-function. So, we put ⎧  ⎨ F (s), if ∃ F  (s); f (s) = ⎩ 0, otherwise. Finally, (generalized) intensity is 

f (s) def − λ(s) == δ(s − ai ) ln F (ai + 0) − F (ai − 0) , 1 − F (s) i where {ai } is a set of the discontinuous points of d.f. F (s). It is easy to see, that the formula (3) remains true for generalized intensity. Let Intξ (s) be an intensity of r.v. ξ. We skip very easy proof of the next Lemma 3. Lemma 3. Intmin{ξ;η} = Intξ + Intη . 3.3



Notations and Assumptions

Consider the sequence {ξ1 , ξ2 , . . .} of random variables. Assumptions 1. ξj = min{ζj ; ηj }, were {ζj } are i.i.d. r.v.’s defined by (generalized) intensities ϕi (s) ≡ ϕ(s), and ζi ⊥⊥ ηj for all i, j; ηj are defined by (generalized) intensities μj (s); 2. There exists some (generalized) measurable function Q(s) such that for all s ≥ 0, ϕ(s) + μj (s) = λi⎛ (s) ≤ Q(s);⎛ ⎞⎞ ∞ ∞ x ⎝xk−1 exp ⎝− ϕ(s) d s⎠⎠ d x < ∞ for some k ≥ 3. ϕ(s) d s = ∞, and 0

0

0

2; 4. Q(s) is bounded in some neighborhood of zero; 5. ϕ(s) > 0 a.s. for s > T ≥ 0. Definition 3. If conditions 1–4 are satisfied, then the counting process  i  ∞   def Nt == 1 ξk ≤ t i=1

is named generalized renewal process.



(4)

k=1



374

G. Zverkina def

def

For this quasi-renewal process the r.v.’s Bt == t − SNt and Wt == SNt +1 − t are backward renewal time and forward renewal time accordingly. Remark 1. The r.v. Wt also can be represented as Wt = min{ζ(Bt ), η(Bt )}, P{ζNt +1 − Bt ≤ s} where ζ(Bt ) has the distribution function P{ζ(Bt ) ≤ s} = , 1 − P{ζNt +1 > Bt } P{ηNt +1 − Bt ≤ s} and η(Bt ) has the distribution function P{η(Bt ) ≤ s} = . 1 − P{ηNt +1 > Bt } Remark 2. The Assumption 1 holds: the r.v.’s ξi and ξj are dependent, and this dependency is “weak” dependency in some sens. Also the intensity of renewal time of considered quasi-renewal process is a sum of two independent processes: one of them is a classic renewal process (with renewal times ζi ) and quasi-renewal process with (dependent) renewal times ηi . Such a process describes some process that has some minimal intensity and additional increase in intensity due to the influence of some external factors.  Var ξi2 > 0.

Remark 3. The Assumptions 3 and 4 hold: E ξi > 0,



Remark 4. The Assumptions 1 and 2 hold: ⎛ t ⎞ ⎛ t ⎞   Fi (t) = P{ξi ≤ t} = 1 − exp ⎝ −λi (s) d s⎠ ≥ 1 − exp ⎝ −Q(s) d s⎠ 0

0

⇒ ∃ E ξi2 < ∞.



Remark 5. The Assumption 5 reports that the renewal process under study is a delay renewal process, and a delay time does not exceed T .  Theorem 2 (Generalized Lorden’s inequality – see [9]). If the conditions 1–4 are satisfied, then for the process (4) the inequality E ζ2 = Ξ(= Ξ(1)), 2E ξ ∞ E ξ = x d G(x), and

E Bt ≤ E ζ + ∞ is true, where E ζ = ⎛

x d Φ(x); 0

G(x) = 1 − exp ⎝−

x



0



Q(t) d t⎠ , and Φ(x) = 1 − exp ⎝−

0

(5)

x

⎞ ϕ(t) d t⎠ .



0

Remark 6. In the proof of this Theorem, there is an intermediate result: If E ζ k < ∞, then for N ∈ (0; k − 1], E (Bt )N ≤= E ζ N +

E ζ N +1 def == Ξ(N ). (N + 1)E ξ



On Generalized Markov Modulated Poisson Processes

4

375

Considered Generalized Markov-Modulated Poisson Process def

(1)

(2)

(3)

(m)

Consider the process Xt == (Xt , Xt , Xt , . . . Xt ), where the processes (i) (i) Xt , i = 1, 2, . . . m are generalized renewal processes Xt , i = 1, 2, . . . m. (i) For these processes, the backward renewal times Bt and forward renewal (i) (i) times Wt are for processes Xt accordingly defined in the Remark 1. (i)

At the time t, the state of the process

(i) Xt

is

(i) xt



Nt

= t−

(j)

(i)

ξi (= Bt



j=1 (i) elapsed renewal time or backward renewal time of process Xt ) – see Fig. 1. (i) (i) (i) The intensities of the processes Xt , i = 1, 2, . . . m are ϕ(Bt ) + μi (Bt ). (i) (j) (j) (j) Renewal times of quasi-renewal process Xt are ξi = min{ζi , ηi }, where (j) (i) (j) ζi has intensity ϕ(xt ), and ηi has intensity μi (Xt ). (i) (j) So, the “full” intensity of Xt (which corresponds to ζi in Assumption 1) (i) (j) is λi (Xt ) = ϕ(xt ) + μi (Xt ). “Additional” intensity (which corresponds to ηi (1) (2) (3) (m) in Assumption 1) is μi (t) = μ(xt , xt , xt , . . . xt ).

For simplicity, here we replace inequalities λi (x) ≥ ϕi (x) and λi (x) + μi (x) ≤ Qi (x) by homogeneous inequalities λi (x) ≥ ϕ(x) and λi (x) + μi (x) ≤ Q(x). (i) (i) The processes Xt are dependent, and the intensity of Xt depends on the (j) state of the processes Xt , j = i. def (1) (2) (3) (m) The process Xt == (Xt , Xt , Xt , . . . Xt ) is not regenerative in general. It can be considered as a kind of variation on the topic of the Markov modulated Poisson process (see, e.g., [5,11]) Emphasize, that for simplicity, here we suppose, that the functions ϕ(s) and Q(s) are the same for all processes. Additional Assumption s Q(s) d s < ∞, and there exists non-negative function q(s) 6. For all t > 0, 0

such that μi (s) = λi (s) − ϕ(s) ≥ q(s). Remark 7. From Assumptions 1 and 6 we have the formulae for distributions of ζ and η. P{ζi ≤ s} = Φ(s) > 0 for s > T, ⎛

and

 P{ηi ≤ s} = G(s) == 1 − exp ⎝− def

⎛  ≥ exp ⎝− P{ηi > s} = 1 − G(s)

s 0

s 0

⎞ (Q(t) − ϕ(t)) d t⎠ ; ⎞

Q(t) d t⎠ = 1 − G(s).

376

G. Zverkina

Note, that P{ζ < ∞} = 1, and P{η < ∞} ≤ 1. (i) Assumptions 1–6 hold: the probability densities of the r.v.’s ξj can be bounded as: ⎛ x ⎞  (i) Fj (x) = P{ξj ≤ x} = 1 − exp ⎝− (λj (s) + μj (s)) d s⎠ ≤ 0

⎛ 1 − exp ⎝−

x

⎞ ϕ(s) d s⎠ ;

(6)

⎛ x ⎞  d Fj (x) ≥ exp ⎝− Q(s) d s⎠ ϕ(s) > 0 a.s. for t > T . fj (x) = dx 0

0 (i)

(i)

(i)

For forward renewal times Wt (a) of the processes Xt given Bt > a have the probability densities: ⎛ x+a ⎞  def (i) Q(s) d s⎠ == f (a, x) > 0 a.s. for t > T , (7) ft (x, a) ≥ ϕ(a + x) exp ⎝− a

see the Assumption 5. (i)

P{ζt 4.1

(i)



(i)

> ηt |Bt < Θ} ≥ A(Θ).

Ergodicity of the Multi-dimensional Process Xt

Here we give only the schema for the proof of the ergodicity of the multidimensional process Xt . Suppose, X0 = (0, 0, 0, . . . , 0). Put θ0 = 0. This is markov moment of Xt . (i) At these times, the backward renewal time Bθ1 satisfies the inequality (5). Put constant Θ > Ξ. By Markov inequality, (i)

P{Bθ1 ≥ Θ} ≤

Ξ Ξ (i) , and P{Bθ1 < Θ} ≥ 1 − = π0 (Θ). Θ Θ (i)

These bounds are uniform for all the processes Xt , they don’t depend on (i) the number i of the process Xt . (i) (i) So, at the time θ for all the processes Xt , Bθ1 < Θ, with probability def

greater than p0 == (π0 (Θ))m . (i) (i) At this time, the forward renewal times Wθ1 of the processes Xt are the residual times of ζ (i) given the elapsed time is less then Θ for all ζ (i) . Now, we can use the generalization of the Basic Coupling Lemma, and we (i) can create (in some probability space) the prolongation of the processes Xt by

On Generalized Markov Modulated Poisson Processes

377

such a way, that the next renewal times of both these processes coincide with probability greater then ∞ def inf min{f (x, aj )} d x > 0 − see (7). π1 == aj ∈[0;Θ],j=1,2,...,m

0 (j)

(j)

If at the time θ1 = θ0 + max{ξ1 } = θ0 + max{Wθ0 } all the processes

(i)

Xθ0 = 0, we say that θ1 is the first regeneration point of the constructed version for Xt . In this case Xθ1 = Xθ0 , and we repeat the procedure descripted above. (i) Otherwise consider Wθ1 . Again with probability greater then π1 at the time def

(i)

(i)

θ2 == θ1 + max{Wθ1 } constructed versions of the processes Xt i

coincide.

Note that E (θ2 − θ1 ) ≤ Ξ (Theorem 1). Anew we use the generalization of the Basic Coupling Lemma, and we can (i) create (in some probability space) the prolongation of the processes Xt by such a way, that the next renewal times of both these processes coincide with probability greater then π1 , and so on. def (i) This operation is repeated at every times θ == θ−1 + max{Wθ−1 }. i

t def By this way, on some probability space we construct the new process X == t(2) , X t(3) , . . . , X t(m) ), such that the marginal distributions of X t and Xt t(1) , X (X t hits to the state (0, 0, 0, . . . , 0) are equal, and after any time θ the process X with probability greater then p0 π1 . The time between the hits to this zero-state are distributed as geometrical sum of constants M and the finishing residual time of the last period. So, it has t is regenerative. Therefore, it has a the finite expectation, and the process X limit probability distribution. In this situation, it is natural to call the process Xt as “quasi-regenerative process”. In fact, here we used the scheme of successful coupling, but in a slightly different way. t can be estimated by the Remark 8. The limit distribution of the process X same schema as for a “classic” renewal process (see [12]): s (1 − Φ(u)) d u t P{X

(i)

def

> s} ≤ Ψ (s) == 0∞ . (1 − G(u)) d u



0

4.2

About Polynomial Convergence of the Process Xt

Now, consider two independent version of multi-dimensional process Xt : Xt and t(1) , X t(2) , X t(3) , . . . , X t(m) ). t = (X X

378

G. Zverkina

For simplicity, x0 = 0, y0 = 0. The second process has an arbitrary initial (i) state: x 0 = ai . (i) t(i) have the densities greater the processes X So, the residual⎛ times ξ1 (ai ) of ⎞ x+a  i then ϕ(ai + x) exp ⎝− Q(s) d s⎠ (see (7)). ai

∞

So, if there exists finite

⎛ xk exp ⎝−

x

0

m 

=

Q(s) d s⎠ d x < ∞, then there exist

0

(i) finite expectations of E (ξ1 (ai ))k−1 .

After the time θ0



def

S0 (a1 , a2 , . . . , am )

==

max

i=1,2,3,...,m

{ξ1 (ai )} (i)



(i) ξNt +1 (ai ), we can use the generalization of Lorden’s inequality.

i=1 def

Denote θ == θ−1 +

max

i=1,2,3,...,m

 {Wθ−1 , W θ−1 }. (i)

(i)

At the time θ0 , consider probability def (i)  (i) < Θ, i = 1, 2, 3, . . . , m} − Π == P{Bθ < Θ, B θ

t . here the letters with caps refer to the process X Similarly to the calculations in the Subsect. 4.1 we have Π ≥ (p0 )2 . Now the generalized Basic Coupling Lemma gives the probability of coincidence of the prolonged versions of both processes after any time θ – this probability ≥ π1 . Thus, after any time θ0 the construction of successful coupling leads to the moment of coincidence of both processes in zero-state (0, 0, 0, . . . , 0) with probability greater then (p0 )2 π1 – this is a coupling epoch for the processes Xt and t . Otherwise, we use the generalized Basic Coupling Lemma at the time θ1 , X and so on. So, after any time θ with probability π ≥ (p0 )2 π1 (see Lemma 2) we can cont hit to the zero-states (0, 0, 0, . . . 0) tinue the versions of all processes Xt and X contemporaneously is a coupling epoch of created on some probability space t – see Subsect. 2.2. versions of Xt and X Let E be the event {coupling epoch happened right after time θ }. So, the coupling epoch τ (a1 , a2 , . . . , am ) ≤ S0 +

ν+1 

(i)

(1)

(max{Wθj }) + {ξNθ |E },

j=1

i



(i) j def with probability P (E ), and P{ν −1 > n} ≥ (1−π)n ; denote W == max{Wθj }.

j )N ≤ Ξ(N ) for N ≤ k − 1 – see Remark 6. E (W (Note that E{ς|B} × P{B} ≤ E ς for all r.v. ς and event B.)

i

On Generalized Markov Modulated Poisson Processes

379

Thus, using the Jensen’s inequality in the form 

j 

N ri

 =j

N

i=1

j 

N ri /j

≤ mN −1

i=1

j 

(ri )N ,

j > 1, j ∈ N,

i=1

so, for coupling epoch we have for N ≤ k − 1: (τ (a1 , a2 , . . . , am ))N ≤ (m + 2)N −1 ⎞ ⎛ ν+1 N m   (r) (1) r W × ⎝ (ξi (ai ))N + + ({ξNθ |E })N ⎠ r=1



r=1

with probability P{E }, and the last term is a conditional r.v., provided that the coupling epoch is on the end of this r.v. So, E (τ (a1 , a2 , . . . , am ))N ≤ (m + 2)N −1 m   (r) (1) × E (ξi (ai ))N + E (ν + 1)N × Ξ(N )N + E (ξNθ )N 

r=1 def

== T(a1 , a2 , . . . , am )N ,

(1)

where ν is geometric r.v. with parameter π; here E (ξNθ )N ≤ E (ζ1 )N .  Now, integrating T(a1 , a2 , . . . , am )N over a stationary measure bounded in (8) and considering Remark 8, we can find an upper bound K(N ) in formula (1) for initial zero-state of the process Xt . Remark 9. For arbitrary initial state of the process Xt , the same schema can be used.  Remark 10. The value of K(N ) depends on the value Θ. It can be optimized. 

5

Application for One Reliability System

Consider two elements reliability system. Let the intensities of the failure and of the repair of the main element depend only on the state of this element. And let the intensities of the failure and of the repair of the reserve element depend on the full state of this reliability system. The state of the main element is (i, x), where i is an indicator of work/failure state, and x is the elapsed time in this state. So, the intensities of failure and of repair are λ(i, x). The state of the reserve element also is is (j, y), where j is an indicator of work/failure state, and y is the elapsed time in this state. The intensities of  y). failure and of repair of this reserve element are λ(j, We suppose that these intensities satisfy the Assumptions 1–7.

380

G. Zverkina

In this case, the full periods (work+repaire) of the main element are i.i.d. random variables. The full period (work+repaire) of the reserve element are the periods of embedded generalized renewal process. Thus, we can prove the ergodicity of this reliability system, and calculate the upper bounds for the convergence rate of its distribution. If we take into account the peculiarities of the distributions of work and repair, and consider not only the times of work beginnings of the main element, these estimates can be improved.

6

Conclusion

Here we give only the schema of use of the generalized Lorden’s inequality for multi-dimensional process and one application to the reliability theory. This is only beginning of development of this approach to the finding of strong bounds for various stochastic models. Acknowledgments. The author is grateful to E. Yu. Kalimulina for the great help in preparing this paper. The work is supported by RFBR, project No. 20-01-00575A.

References 1. Afanasyeva, L.G., Tkachenko, A.V.: On the convergence rate for queueing and reliability models described by regenerative processes. J. Math. Sci. 218(2), 119– 36 (2016) 2. Asmussen, S.: Applied Probability and Queues. SMAP, vol. 51, 2nd edn. Springer, New York (2003). https://doi.org/10.1007/b97236 3. Chang, J.T.: Inequalities for the overshoot. Ann. Appl. Probab. 4(4), 1223 (1994). https://doi.org/10.1214/aoap/1177004913 4. Doeblin, W.: Expos´e de la th´eorie des chaˆınes simples constantes de Markov ´ a un nombre fini d’´etats. Rev. Math. de l’Union Interbalkanique 2, 77–105 (1938) 5. Fischer, W., Meier-Hellstern, K.: The Markov-modulated Poisson process (MMPP) cookbook. Perform. Eval. 18(2), 149–171 (1993) 6. Gnedenko, B.V., Belyayev, Y., Solovyev, A.D.: Mathematical Methods of Reliability Theory. Academic Press, Cambridge (2014) 7. Gnedenko, B.V., Kovalenko, I.N.: Introduction to Queuing Theory. Mathematical Modeling. Birkh¨ aeuser Boston, Boston (1989). https://doi.org/10.1007/978-14615-9826-8 8. Griffeath, D.: A maximal coupling for Markov chains. Zeitschrift f¨ ur Wahrscheinlichkeitstheorie und Verwandte Gebiete 31(2), 95–106 (1975). https://doi.org/10. 1007/BF00539434 9. Kalimulina E., Zverkina G.: On some generalization of Lorden’s inequality for renewal processes. Cornell university library, Cornell, pp. 1–5 (2019). arXiv:1910.03381v1 10. Lorden, G.: On excess over the boundary. Ann. Math. Stat. 41(2), 520 (1970). https://doi.org/10.1214/aoms/1177697092. JSTOR 2239350 11. Ryd´en, T.: Parameter estimation for Markov modulated Poisson processes Communications in Statistics. Stoch. Models 10(4), 795–829 (1994)

On Generalized Markov Modulated Poisson Processes

381

12. Smith, W.L.: Renewal theory and its ramifications. J. Roy. Statist. Soc. Ser. B 20(2), 243–302 (1958) 13. Zverkina, G.: On Strong Bounds of Rate of Convergence for Regenerative Processes. In: Vishnevskiy, V.M., Samouylov, K.E., Kozyrev, D.V. (eds.) DCCN 2016. CCIS, vol. 678, pp. 381–393. Springer, Cham (2016). https://doi.org/10.1007/9783-319-51917-3 34 14. Zverkina, G.: Lorden’s inequality and coupling method for backward renewal process. In: Proceedings of XX International Conference on Distributed Computer and Communication Networks: Control, Computation, Communications, DCCN-2017, Moscow, pp. 484–491 (2017) 15. Zverkina, G.: A system with warm standby. In: Gaj, P., Sawicki, M., Kwiecie´ n, A. (eds.) CN 2019. CCIS, vol. 1039, pp. 387–399. Springer, Cham (2019). https://doi. org/10.1007/978-3-030-21952-9 28 16. Veretennikov, A.Y., Zverkina, G.A.: Simple proof of Dynkin’s formula for singleserver systems and polynomial convergence rates. Markov Process. Relat. Fields 20(3), 479–504 (2014) 17. Veretennikov, A.Y.: On polynomial recurrence for reliability system with a warm reserve. Markov Process. Relat. Fields 25(4), 745–761 (2019) 18. Kato, K.: Coupling lemma and its application to the security analysis of quantum key distribution. Tamagawa Univ. Quant. ICT Res. Inst. Bull. 4(1), 23–30 (2014) 19. Thorisson, H.: Coupling, Stationarity, and Regeneration. Springer, New York (2000) 20. Veretennikov, A., Butkovsky, O.A.: On asymptotics for Vaserstein coupling of Markov chains. Stoch. Process. Appl. 123(9), 3518–3541 (2013) 21. Zverkina, G. About some extended Erlang-Sevast’yanov queueing system and its convergence rate (English and Russian versions) (2018). https://arxiv.org/abs/ 1805.04915. Fundamentalnaya i Prikladnaya Matematika 22(3), 57–82

The Mathematical Model for Calculating Physical Entity of DPI Analyser Boris Goldstein(B)

and Vadim Fitsov

The Bonch-Bruevich Saint-Petersburg State University of Telecommunications, St. Petersburg, Russia [email protected], [email protected]

Abstract. This article describes the specialized servers that build up the DPI system architecture. Some initial data for calculating DPI system based on traffic statistics have been formalized. The develop formalization of the ratio of flows and packets. This paper describes a mathematical model for calculating the analysis time for a given number of processors in a specialized server of the DPI system. A mathematical model for calculating physical entity of DPI analyser in the DPI system, based on the model by Ventcel-Ovcharov, is provided. The concept of the Ventcel-Ovcharov model with equal mutual assistance is to combine channels into groups for the joint service of requests. The formula of the final processing time of requests of the physical entity of DPI analyser is presented. The DPI simulation model in GPSS World is briefly described. The general architecture of the DPI system is taken into account when building a simulation model. The results of the mathematical and simulation modeling are compared. Keywords: DPI · QoS · Queuing system (QS) (QN) · Mathematical model

1

· Queuing network

Introduction

Many telecom operators use deep packet inspection (DPI) systems to manage and offload their networks, analyze user interests, behavioral targeting, implement personal tariffs, protect copyrighted content, provide lawful interception (LI) according to the laws of their country, additional network protection against hacker attacks. However, DPI requires a significant investment in hardware resources. Meanwhile the efficiency of using hardware resources in DPI systems remains understudied due to the complexity and novelty of the issue. There is a lack of necessary mathematical and simulation models for determining the parameters of a DPI architecture. This paper describes a mathematical model for calculating the analysis time for a given number of processors in a specialized server of the DPI system. DPI mathematical and simulation models would reduce the purchase cost of DPI systems and to avoid overloads. c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 382–393, 2020. https://doi.org/10.1007/978-3-030-66242-4_30

The Mathematical Model for Calculating Physical Entity of DPI Analyser

2

383

Related Work

There is a fairly large number of works dedicated to the questions of mathematical description, analysis and classification of network traffic. In this article, when describing and formalizing the process of transferring flows for analysis, the studies [3,14,17,30] were used. The closest is the work [14], in which a mathematical model of DPI interaction with additional servers is presented and the traffic flow is taken as an example (which will be discussed below). In Russia, the mathematical description of packet traffic is developed by Stepanov S.N. [21], Samuilov K.E., Gaidamaka Y.V. [2], Levakov A.K., Sokolov N.A., Zaitsev V.S. [18], and others. There are various mathematical models, but when applying, one should take into account the peculiarities of a packet traffic. Modern western research suggests that network traffic is similar to itself or fractal in structure (pulsating on a wide time scale). This kind of traffic is most successfully described by the Pareto and Weibull distributions or as fractal Brownian motion (FBM) [5,13]. Also, traffic often has the feature of packets arriving in batches with service requests, which is described in [21]. There are promising models for representing packet traffic as fractal Brownian motion (FBM), which are detailed in [5]. When there are several interacting queuing systems (QS), they make up a queuing network (QN). In a QN, the interest is the parameters of the output after processing in QS1, which determine the models that can be used to describe the subsequent QS (QS2). For the mathematical description of the QS as a part of the QN which receives packet traffic, the models G/M/1, G/G/1 described in [1,5,19] and others can be used. However, they restrict the model to one device. The G/G/V model should be used to overcome this limitation and to describe modern systems, but it cannot be calculated [5]. Most of the known models suggest an arriving Poisson flow of requests. For example, M/G/1, which is suitable for calculating the QS with one device. M/M/V and M/G/V with an infinite queue, which do not take into account the possibility of simultaneous processing of a request by several devices. As well as processor sharing models [12] and so-called Ventcel-Ovcharov model with an equal mutual assistance (where several devices work to serve one request) [15,16,23,24]. The processor sharing model, described by Kleinrock in 1967 [12] is widely known. PS or EPS (egalitarian processor sharing) is a service policy in which all requests are served simultaneously. Each newly arrived request receives an equal share of the bandwidth. This does not imply the presence of a queue. Significant results in the systems with fair processor sharing research were introduced in theory by Yashkov S.F. [25–28]. ESP is very close to the so-called Ventcel-Ovcharov model with full mutual assistance. A queuing system in which several devices jointly serve one request is called QS with mutual assistance. In the works of Ventcel and Ovcharov [16,23,24], a description of a model with several service devices, a finite queue and equal mutual assistance is given. According to Burke’s theorem for QS1 (M/M/V and M/M/1), the distribution of time intervals between outgoing requests, as well as the time intervals

384

B. Goldstein and V. Fitsov

between incoming requests, are distributed exponentially with the same parameter. Which was proved mathematically by Burke, based on the following: when QS1 becomes empty after it’s done with the query, the time interval when the next request leaves the QS1 will be the sum of the time until the next request arrives at the QS1 and the service time of the next request; when there is a next request in the QS1 queue, after the previous one is finished, then the time interval when it leaves QS1 is distributed in the same way as the service time. The mathematical description of the output flow of requests after processing in QS1 (of M/G/1 type, with Poisson input flow of requests) is described in [19]. At the same time, note that the value of the coefficient of the interval duration of requests moving between systems cannot be considered as a sufficient condition for the correspondence of the distribution function of the output flow to the exponential distribution law. But it is a necessary condition for the exponential approximation. The coefficient of variation of the output flow is close to 1 in two cases: when the primary server load is very low or when the variation coefficient of the request service time is very close to 1. It was shown for the M/M/1 model in [19] that the output flow is also a Poisson flow. In [1], it is said that for a primary server G/G/1 with an unlimited capacity storage unit operating without overloads, the intensity of the outgoing flow of requests is equal to the intensity of the incoming flow (since the mathematical expectations of the intervals between successive requests at the exit and the entrance coincide). In addition, it is said in [1] that for the M/M/1 model, the variation coefficient of the outgoing flow is equal to one. According to the study [29], the value of the variation coefficient of the resulting flow of requests (packet traffic) on the input of QS1 of a large number of sources with similar distributions for certain cases approaches one. The subsequent verification carried out in [29] using the Kolmogorov-Smirnov criterion showed that the addition of a large number (more than 100) of flows with the Weibull distribution gives the resulting flow a manner similar to Poisson flow. In this case, one should take into account the magnitude of errors in such a simplification. Let us consider the cases in which a forced assumption will be made about the exponential distribution of the flow exiting QS1 and entering the QS2, in order to compare the results of the QS2 calculations, which can be given by the socalled Ventcel-Ovcharov model with the results obtained in the DPI simulation model described in [4]. Proceeding from the requirement to avoid packet loss, the QN (consisting of QS1 and QS2) is designed in such a way that it can be represented as a system with an infinite queue, which is important for the cases considered below. In the first case, QS1 receives aggregated packet traffic received from more than 100 sources, where each traffic from each source can be approximately described by the Weibull distribution. Then, according to [29], we assume that the distribution of the flow of requests entering the QS1 may be close to the Poisson distribution, but it should be borne in mind that there are some errors associated with this assumption. Then, according to [1], let us assume for one

The Mathematical Model for Calculating Physical Entity of DPI Analyser

385

QS1 service device that the output flow entering QS2 is also close to the Poisson distribution. In the second case, if we assume that QS1 processes requests according to an exponential distribution, and is in a mode when the average intensity of requests is equal to the average intensity of request processing, but the system remains in a stable state and the waiting time in the queue does not become infinite. Then, according to Burke’s theorem, the intensity of the output flow of requests from QS1 to QS2 will be distributed in the same way as the service time in QS1. This means that if we assume that requests in QS1 are treated exponentially, then the output flow will have an exponential distribution. The third case is less interesting, since imposes even greater restrictions on the QS1. First, according to the conditions and assumptions of the first case, it is assumed that a flow close to Poisson arrives at the QS1. And secondly, QS1 must process requests according to an exponential distribution. Then, according to Burke’s theorem, the distribution of time intervals between outgoing requests, as well as the time intervals between incoming requests, are distributed exponentially. In this case, there is no limitation per 1 device as in the first case, and there is no limitation of the mode necessarily operating in a limited but stable state, as in the second case. Further mathematical calculation of the QS2 (DPI analyser) is carried out based on these three cases.

3

DPI

In 2012, the International Telecommunication Union (ITU) officially approved the Y.2770 [6] document. This recommendation defines the requirements for DPI objects and describes aspects such as application identification, flow identification, signature management, interaction with the decision functional entity according to network policy, and more. In subsequent years, a series of recommendations for DPI came out [7–11]. A flow (associated with a specific user application or service protocol) is usually identified using address information from layers 2–4 of the OSI model. So DPI analyzes the first packets of a traffic flow or all packets passing through it [3,17,22]. The basis of the DPI system is the Bypass server, the hardware filter (HWF: DPI scanner and DPI action execution function), DPI analyser (DPI-An or Front-End), PCRF (Policy and Charging Rules Function) and Back-End. Each of the DPI servers performs its own tasks and actively interacts with the rest. DPI analyser - is the main element of the system, as it analyzes data from the traffic flow previously identified by the hardware filter. It uses signature analysis, statistical methods, behavioral analysis, and other approaches [20]. Having recognized the application that generated the traffic flow, DPI analyser asks the PCRF server for a decision on what to do with this traffic. Further, based on this decision, it receives more detailed instructions on filtering from the Back-End server. Then it gives the flow and instructions for execution on the hardware filter.

386

B. Goldstein and V. Fitsov

Back-End - is a repository of information about policy rules, collected statistics, signatures (analysis criteria), mirroring and redirection rules, AAA (Authentication, Authorization, Accounting). PCRF - is a server for real-time policy enforcement and policy management. Contains policy ID (Identifier) for each case. DPI analyser sends the ID of the subscriber or application, and PCRF returns the required policy number. Thus, the DPI system can be represented as a QN, consisting of several QS. Where the hardware filter acts as QS1, which receives the packet data, and the output flow from it goes to QS2 (DPI analyser). Subsequent DPI servers are not taken into account in this work, due to the relatively smaller number of request sentering them.

4 4.1

The Mathematical Model Formalization DPI Input Parameters

For the practical use of mathematical models, it is necessary to determine methods for obtaining quantitative characteristics of the operating conditions of the DPI system and formalize some features of the operation of the system itself. This article describes the formalization of some common initial parameters and the number of requests processed on the physical entity of DPI analyser (3). To calculate, you need to know or set the intensity of incoming requests for the DPI system. Therefore, it is rational to use the statistics of the transmitted traffic on the network where you plan to install the DPI system. A peculiarity of DPI is that QS1 (hardware filter) processes all incoming packets and identifies traffic flows from them, and QS2 (DPI analyser) receives a request to analyze a specific flow. For analysis, a certain number of packets of the flow (nf ) is transmitted, about which studies have been carried out [3,22]. Only new unknown flows are analyzed, already known flows are processed according to the previously set rules and are not sent to the DPI analyser. From the traffic statistics collected by wireshark or cisco NetFlow, you can get the number of packets and the number of flows during statistical analysis, and then the average number of packets in the flow (naf ) and the rate of arrival of the packets (λ0 ). In this case, you can get the number and frequency of occurrence of new unknown flows, the probability that the flow was previously known (Pkn ), the time of occurrence of the flow, the time of the end of the flow and the average duration of the flow. The rate of arrival of unknown packets will be determined by the product of the probability of an unknown flow (1 − Pkn ) and λ0 . Based on the above description of the interaction of DPI servers, only a part of the packets of the flow as a request is sent for analysis, which is set by the ratio of the number of analyzed packets (nf ) to the naf (coefficient of the number of requests to the Front-End Kn formula (1)). nf Kn = (1) naf

The Mathematical Model for Calculating Physical Entity of DPI Analyser

387

At the same time, for each analyzed flow, DPI analyser sends a response to the hardware filter, which is set by the ratio of 1 to the naf (the coefficient for recalculating flows and packets (Kf e ) formula (2)). Kf e = (1 − Pkn ) × (Kn +

1 ) naf

(2)

From these components, the number of requests processed at the DPI analyser is obtained, determined by the formula (3). λf e = (1 − Pkn ) × (

nf + 1 ) × λ0 naf

(3)

If necessary, formula (3) can be supplemented to take into account the interaction with the PCRF and Back-End servers. In formula (4), these interactions are partially given. λf ef ull = (1 − Pkn ) × (

nf + 1 + 2 × Pp × (1 + Pb ) ) × λ0 naf

(4)

The parameters defined here, as well as other parameters of traffic characteristics and DPI system features, are presented in Table 1. 4.2

Ventcel-Ovcharov Model and DPI Analyser

Previously, a forced assumption was made in the cases considered in which the exponential distribution of the flow leaving the hardware filter and entering the DPI analyser, in order to compare the results of DPI analyser calculations, which can provide the so-called Ventcel-Ovcharov model with the results obtained in the DPI simulation model. Ventcel and Ovcharov distinguish two types of mutual assistance: full and partial (equal). This article discusses equal mutual assistance. Since the DPI system must process all requests, to simplify the calculations of the DPI analyser mathematical model, it is advisable to take a model with an infinite queue and with equal mutual assistance [15] mentioned, but not completely described, in the works of Ventcel. The concept of the model with equal mutual assistance is to combine channels into groups for the joint service of requests. In this case, a system with equal mutual assistance will have 3 modes of operation, shown in Fig. 1 below: I the number of requests is less than the maximum number of groups (like a classical QS), II - the number of requests is greater than the maximum number of groups, but less than the number of channels (transient mode), III - the number of requests is greater than the number of channels (like a classical QS). One of the advantages of the considered mathematical model is the use of all possible resources of the system before the number of requests equals the number of channels. Mode I of operation implies the formation of channel groups. In this mode, the system operates as a classical QS, in which a group of channels is taken as a

388

B. Goldstein and V. Fitsov

Fig. 1. The state graph of the service model with equal mutual assistance

service device. Mode II of operation, when all possible groups of channels have already been formed, and the system begins to gradually disband them as new requests arrive. Mode III implies the placing of newly received requests in the queue. The system switches to the classic QS operation mode. Accordingly, the operating mode of the system is determined by the number of requests in it. The Ventcel-Ovcharov model with equal mutual assistance describes the operation of servers (in our case, we are talking about physical entity of DPI analyser), when many service processors can distribute computing power to simultaneously work on a single request in the system, or evenly to work on several requests received in the system. However, in the works of Ventcel and Ovcharov [16,23,24] there is no description of a model with an infinite queue and equal mutual assistance. Therefore, the Ventcel-Ovcharov mathematical model had to be transformed for the case with an infinite queue. Let us assume that the intensity of servicing one request by a group of channels will be directly proportional to the number of involved channels. Taking into account the above information about the system, you can get the relevant formulas. Let us denote V - the number of devices in the system, l - the number of devices in one group, h - the maximum possible number of groups. For this model, the probability of system downtime (P0f e ) (5): P0f e =

 h  αi i=0

αh β h+1 + × i! h! 1−β

−1 ,

(5)

where the ratio of the intensity of incoming requests to the intensity of processing by one group is defined in (6) and the ratio of the intensity of incoming requests to the intensity of processing by all devices of the DPI analyser is defined in (7). α=(

λ ) l×μ

(6)

The Mathematical Model for Calculating Physical Entity of DPI Analyser

β=(

λ ) V ×μ

389

(7)

Using the definitions of the average waiting time and service, as well as P0f e (5) [15], we obtain the formula for the average time spent in the queue (8) and the formula for the average service time (9): t¯w =

αh β 1 × × β × P0f e × V ×μ h! (1 − β)2

t¯s = h

1

i=1

i×l×μ+

V

j=h+1

(8) (9)

j×μ

The main indicator of the performance of the DPI system is the average time spent by a request in the system (10). We get it by adding the average service time (9) and the average waiting time (8) (with substituting (5)): For this model, the probability of system downtime (P0f e ), the ratio of the intensity of incoming requests to the intensity of processing by one group (α), the ratio of the intensity of incoming requests to the intensity of processing by all devices of the DPI analyser (β), the formula for the average time spent in the queue (t¯q ), the formula for the average service time (t¯w ) is defined in [15]. The main indicator of the performance of the DPI system is the average time spent by a request in the system (10). We get it by adding the average service time (t¯q ) and the average waiting time (t¯w ) (with substituting P0f e ): T¯f e =

( h

i=1

1 i×l×μ+ V j=h+1 j×μ

h ( i=0

αi i!

+ +

β V ×μ αh h!

×

×

αh h!

β h+1 1−β )

×β×

1 (1−β)2 )

(10)

The mathematical model for the physical entity of DPI analyser was shown. Part of the initial data for calculating the DPI system has been determined. The formula of the final processing time of requests (10) of the physical entity of DPI analyser is presented. 4.3

Data Sets and Calculation

In this section, we will briefly present the calculated average time spent by a request on the DPI analyser obtained for a given set of initial data. All values are summarized in Table 1. To obtain the initial data for the calculations, it was necessary to study the statistics of network traffic that is supposed to be passed through the DPI system. One must find the total number of flows, naf and 1 − Pkn . To determine 1 − Pkn , it is necessary to divide the number of new flows by the total number of flows received during a given period of time. For the calculations presented, we used the traffic collected in the dormitories of SPbSUT using Cisco NetFlow equipment. DPI analyser performance was taken to comply with system stability factors. For simplicity, the calculations were performed for one DPI analyser

390

B. Goldstein and V. Fitsov Table 1. Initial and calculated data. Actions

Name

Determining the average duration of one flow, s Tf

Value 300

Determining the number of packets for the period of traffic collection, packets and their rate of arrival, packets per second

Np

245925000

Determining the intensity of arrival packets, packets per second

λ0

409875

Determining the probability that a flow is known

Pkn

0.78

Determination of the average number of packets in a flow, packets

naf

1093

Specifying the number of packets required for analysis on QS2

nf

10

Specifying the preliminary number of service devices on QS2

Vf e

1

Specifying the intensity of processing requests (QS2)

μf e

917

Calculation of the value of the stability condition

ρf e

0.99

Calculation of the intensity of incoming requests for QS2 from QS1 (3)

λf e

908

Calculation of the average processing time of a T¯f e request on QS2 (10), s

0.10847

server (which reduces the visibility of the Ventcel-Ovcharov model). Average time spent by a request on the DPI analyser server (T¯f e ) is the sum of the waiting time in the queue and the processing time on the DPI analyser. The result of the calculation showed that equipment with a given performance successfully copes with processing the load with a stability coefficient of 0.99. However, a temporary increase in the number of requests to the DPI analyser can lead to a significant increase in the time spent by a request on the DPI analyser server. With the obtained and given in Table 1 value of the average time of finding a request on the DPI analyser server, there is no need to change the server performance.

5

Simulation

For the DPI system, a simulation model (SM) was created in GPSS [4]. GPSS use a discrete-event approach and a set of distribution laws to describe incoming traffic and how it is processed. In the SM, the initial parameters are set, presented in Table 1. However, to describe the traffic arrival, the Weibull distribution (for the HWF) is used, and for the processing law, the exponential distribution (for the HWF and DPI-An). It is possible to apply a SM in GPSS to obtain the

The Mathematical Model for Calculating Physical Entity of DPI Analyser

391

Table 2. Time characteristics of hardware filter and DPI analyser. Model type

Total time ms HWF req., items

HWF av. time DPI-An req., req. in system, ms items

DPI-An av. time req. in system, ms

SM

108.9

884128

24.278

908

84.593

MM

142.8

847983

33.306

908

108.47

probabilistic-temporal characteristics of the DPI system and compare with the results of the calculation using the mathematical model. The simulation model of the hardware filter describes the arrival of a request, its spot in a queue, the marking of new requests in the system, the distribution with a given probability for already known flows and for flows requiring analysis. Receiving instructions from DPI analyser, processing new requests and sending requests to the network, how the end of processing is indicated with different requirements for processing capabilities by a hardware filter and are set when describing the filter. Likewise, on DPI analyser - different times are indicated for the process of analyzing a new flow and for processing other requests. As a result of the simulation model, you can get the number of requests and data on queues. The number of requests received and processed by the system, requests to the hardware filter and to the DPI analyser, and responses. The total time spent by all requests in the system (waiting time and processing time), the total number of requests in the queue (without waiting, with waiting). The simulation results are shown in Table 2. The simulation modeling results showed that DPI system hardware can handle the load with a stability coefficient of 0.99 in this case. Changes in the characteristics of the distribution of incoming traffic to the DPI system, which was described in the simulation model by the Weibull distribution, significantly affects the size of the queue, and through it, the processing time of requests in the hardware filter. Comparison of the calculation results based on the mathematical and simulation models given in Table 2 indicates the possibility of their use. To obtain more accurate results, it is necessary to clarify the parameters of the distribution of the arrival processes and processing of requests in the simulation model.

6

Conclusion

The aforementioned work formalized the initial data for calculating the DPI system based on traffic statistical data. The mathematical model of VentcelOvcharov is presented. The possibility of practical application of this model for calculating specialized DPI servers is shown. This paper describes the need for a mathematical model to determine the parameters of the DPI analyser in the DPI architecture. The mathematical model is used to calculate the average analysis time for a given number of processors in a dedicated DPI server. The use of the DPI mathematical model will help reduce

392

B. Goldstein and V. Fitsov

the purchase cost of DPI equipment and avoid overloads on communication networks early. The developed formalization of the ratio of flows and packets can be useful in calculating DPI systems and other similar systems.

References 1. Aliev, T.: Basics of Modeling Discrete Systems. SPbGU ITMO, Saint Petersburg (2009) 2. Basharin, G., Gaidamaka, Y., Samuilov, K., Yarkina, N.: Models for Analyzing the Quality of Service in Next Generation Communication Networks. RUDN, Moscow (2008) 3. Dainotti, A., Pescape, A., Sansone, C.: Early classification of network traffic through multi-classification. In: Traffic Monitoring and Analysis III, pp. 122–135 (2011) 4. Fitsov, V.: A simulation model of the DPI system based on the GPSS world software. In: Actual Problems of Information and Telecommunications in Science and Education V Conference, pp. 539–545 (2016) 5. Grimm, C., Schluchtermann, G.: IP Traffic Theory and Performance. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-70605-2 6. ITU-T: Recommendation ITU-T Y.2770 requirements for deep packet inspection in next generation networks (2012) 7. ITU-T: Recommendation ITU-T Y.2771 framework for deep packet inspection (2014) 8. ITU-T: Recommendation ITU-T Y.2772 mechanisms for the network elements with support of deep packet inspection (2016) 9. ITU-T: Recommendation ITU-T Y.2773 performance models and metrics for deep packet inspection (2017) 10. ITU-T: Recommendation ITU-T Y.2774 functional requirements of deep packet inspection for future networks (2019) 11. ITU-T: Recommendation ITU-T Y.2775 functional architecture of deep packet inspection for future networks (2019) 12. Kleinrock, L.: Time-shared system: a theoretical treatment. J. Assoc. Comput. 14(2), 242–251 (1967) 13. Lozhkovsky, A., Kaptur, V., Verbanov, O.: Mathematical model of packet traffic. Bull. Natl. Polytech. Univ. KhPI 9, 113–119 (2011) 14. Niang, B.: Bandwidth management - a deep packet inspection mathematical model. In: ICUMT 2014, pp. 169–175 (2014) 15. Novikov, A., Fitsov, V.: Application of the Ventcel-Ovcharov mathematical model with uniform mutual assistance for modern NFV systems. In: Actual Problems of Information and Telecommunications in Science and Education VIII Conference, vol. 1, pp. 705–709 (2019) 16. Ovcharov, L.: Applied Problems of the Theory of Queuing. Mashinostroenie, Moscow (1969) 17. Park, J., Yoon, S., Kim, M.: Software architecture for a lightweight payload signature-based traffic classification system. In: Traffic Monitoring and Analysis III, pp. 136–149 (2011) 18. Samuilov, K., Levakov, A., Sokolov, N., Zaitcev, V.: Method of arrival process description for packet switch. In: Proceedings of the Workshop on ITTMM, pp. 47–56 (2020)

The Mathematical Model for Calculating Physical Entity of DPI Analyser

393

19. Sokolov, N.: Telecommunication Networks Planning Tasks. BHV, Saint Petersburg (2012) 20. Song, W., et al.: A software deep packet inspection system for network traffic analysis and anomaly detection. Sensors 20(6), 1637 (2020) 21. Stepanov, S., Thu, D.: The system of equilibrium equations for the model of channel resource allocation on traffic concentration lines. In: Telecommunication and Computing Systems, pp. 24–25 (2010) 22. Wang, Z., et al.: SymTCP: eluding stateful deep packet inspection with automated discrepancy discovery. In: NDSS-2020 Symposium (2020) 23. Ventcel, E.: Probability Theory. Nauka, Moscow (1969) 24. Ventcel, E.: Operations Research. Soviet Radio, Moscow (1972) 25. Yashkov, S.: A derivation of response time distribution for an M/G/1 processorsharing queue. Problem. Control Inf. Theory. 12(2), 133–148 (1983) 26. Yashkov, S.: Analysis of Queues in a Computer. Radio i Svyaz, Moscow (1989) 27. Yashkov, S., Yashkova, A.: Egalitarian separation of the processor. Inform. Process. 6(4), 396–444 (2006) 28. Yashkov, S., Yashkova, A.: Processor sharing: a survey of the mathematical theory. Automat. Remote Control 68(9), 1662–1731 (2007) 29. Zaitcev, V.: Characteristics of the total flow of IP packets at the input of the switching node of a multiservice network. In: Proceedings of the XII Conference Technologies of the Information Society, pp. 178–182 (2018) 30. Zeng, Y., Guo, S.: Deep packet inspection with delayed signature matching in network auditing. In: Naccache, D., et al. (eds.) ICICS 2018. LNCS, vol. 11149, pp. 75–91. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-01950-1 5

The Overflow Probability Asymptotics in a Multiclass Single-Server Retrial System Evsey Morozov1,2,3 1

and Ksenia Zhukova1,2(B)

Institute of Applied Mathematical Research, Petrozavodsk, Russia [email protected], [email protected] 2 Petrozavodsk State University, Petrozavodsk, Russia 3 Moscow Center for Fundamental and Applied Mathematics, Moscow State University, 119991 Moscow, Russia

Abstract. We discuss the asymptotic of the large deviation probability in a single-server retrial queue with K classes of customers. The constant retrial rate policy is assumed. The input is assumed to be a general renewal process and the retrial attempts follow an exponential distribution. The system is described with a regenerative process. We are interested in the stationary probability that the orbit size reaches a level N within regeneration cycle, as N → ∞, called large deviation probability. We interpret the original multiclass retrial system as a buffered system with the service time of special type to construct the upper and lower bounds of the large deviation probability. Some numerical examples are also included. Keywords: Retrial queue · Large deviation Virtual orbits · Stochastic ordering

1

· Overflow probability ·

Introduction

The large deviation analysis is closely connected with the evaluation of the quality of service indexes of the telecommunication and computer systems. One of such an important parameter is the stationary overflow probability that the buffer content (the number of customers in the system or the orbit size) exceeds a given threshold N , as N infinitely grows. The problem of calculating and estimating the overflow probability in the multiserver classic buffered system has been well-studied previously, see for instance, [2,12]. For our research, the approach developed in the paper [10], where this problem for the tandem system has been considered, plays an important role. The retrial models are highly motivated by practical applications in the modern wireless communications systems. The research was carried out under state order to the Karelian Research Centre of the Russian Academy of Sciences (Institute of Applied Mathematical Research KarRC RAS) and supported by the Russian Foundation for Basic Research, projects 18-0700147 and 19-57-45022. c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 394–406, 2020. https://doi.org/10.1007/978-3-030-66242-4_31

Overflow Probability Asymptotics

395

In this paper, we consider a single-server retrial system with two orbits and constant retrial rate. The large deviation analysis of the overflow probability in the multi-server retrial queue has been studied in particular, in [3,5,6]. In the paper [3], using the approach developed in [10], the lower and upper bounds for the decay rate of the overflow probability during a regeneration cycle in retrial system with constant and classical retrial rates have been constructed. These results, based on the analysis developed in the fundamental monograph [9], have been extended in [7] to the probability of the overflow during full busy cycle of the multiserver retrial system. To analyze a multiclass retrial queue with several orbits, we will apply the approach suggested in [3]. The key idea is to represent the original retrial system as an equivalent buffered single-server system with dependent service times. This interpretation allows further to compare the original queueing system with the well-studied buffered classic systems. More exactly, this approach allows to construct the upper and lower bounds for the large deviation (overflow) probability that the number of customers in the system reaches level N within regeneration cycle, as N → ∞. The main contribution of this research is an extension of the approach from [3] to the multiclass retrial queueing system with stochastically ordered service times. The paper is organized as follows. In Sect. 2 description of the model is given and interpretation of the original multiclass retrial queue is discussed. Moreover this section contains the analysis of the overflow probability, which is the main contribution of this research. Numerical examples are further presented in Sect. 3, which demonstrate the tightness of the constructed bounds for the retrial system with exponential and Weibull service times.

2

An Associated Buffered Multiclass System

In this section we discuss an interpretation of a retrial queue and apply it to construct the lower and upper bounds of asymptotic of the overflow probability. 2.1

Description of a Model

We consider a single-server K-class retrial system with a renewal input of customers arriving at the instants {tn }, with independent identically distributed (iid) interarrival times τn := tn+1 − tn , t1 = 0, and K classes of the customers. It is assumed that with probability pi the n-th arrival is class-i customer with the (i) (i) service time Sn , n ≥ 1. The service times {Sn , n ≥ 1}, being class-dependent, are assumed to be iid, with generic element S (i) , i = 1, . . . , K. (In what follows we omit the serial index to denote a generic element of an iid sequence.) We introduce the service time Sn of customer n as Sn =

K  i=1

Sn(i) 1n(i) ,

(1)

396

E. Morozov and K. Zhukova (i)

where 1n is the indicator function defined by  1, with probability pi 1n(i) = 0, with probability 1 − pi ,

(2)

K We note that i=1 pi = 1. Also we note that, for each fixed i, the sequence (i) {1n , n ≥ 1} is iid by construction, with generic element 1(i) . It is easy to see that the service times {Sn , n ≥ 1} defined in (1) are iid as well. Also we introduce the input rate and the service rates, respectively, λ=

1 1 , μi = , i = 1, . . . , K. Eτ ES (i)

It is assumed that there are K infinite-capacity virtual orbits. It is assumed that, if a new customer finds the server busy, he joins a class-dependent orbit and attempts to occupy the server after an exponential time with class-dependent rate. We consider a constant retrial rate policy, when the retrial rate does not (i) depend on the orbit size. Denote by {ξn } the iid retrial times of class-i customers with generic time ξ (i) and retrial rate γi = 1/Eξ (i) , i = 1, . . . , K. We will study the stationary overflow probability PN , that the number of customers in the retrial system reaches a level N during a regeneration cycle. (Below we give more precise definition of PN .) The regenerations of the system occur when an arrival meets completely empty system. (A detailed discussion the regenerative structure of this system can be found in [3].) Our purpose is to construct the upper and lower bounds of the logarithmic asymptotics of the large deviation probability PN as N → ∞. To construct these bounds, we compare the probability PN in the original system with the similar probabilities in the classic buffered systems with the same input flow, in which service times satisfy some stochastic ordering. This idea has been applied previously in the large deviation analysis for the tandem networks in the paper [10], and for the retrial multiserver queue in the paper [3]. In the retrial queue, after each departure, the server stays idle until the next customer, either a new arrival or a retrial customer, occupies it. In the further analysis we interpret this idle time as a part of the service time of the next customer. This allows us to define a new sequence of the service times, denoted by {Sˆn , n ≥ 1}, written as Sˆn =

K 

S˜n(i) ˜1n(i) + ζn =: S˜n + ζn , n ≥ 1,

(3)

i=1 (i) where the indicators function ˜1n takes the values  ˜1n(i) = 1, if the n − th customer in the server is class − i 0, otherwise,

(4)

and ζn is the mentioned above idle time of the server between the departure of customer n − 1 and the next service initiation. Moreover, the random variables

Overflow Probability Asymptotics

397

(i) (i) S˜n are selected from the same basic sequence {Sn , n ≥ 1}, that is S˜(i) is (i) distributed as S (i) , however {S˜n , n ≥ 1} are not iid in general. It is because we assign the service times in the order in which service initiations occur, and it destroys the order of arrivals. As a result, the actual fractions of the class-i customers in the representation (1) may differ with the given proportions pi at least on a finite interval of the observation. The interpretation of the idle time of the server as a part of service time does not change distributional properties of the the number of customers in the retrial queue. Moreover, it allows us to compare the original system to classical systems with the same input and service times which are (stochastically) less or bigger than the service times Sˆn .

2.2

Analysis of a Large Deviation Probability

The interpretation described above allows to consider the original retrial system as a buffered system with the same input flow and the service time of type (3) which in general are not iid because the summands {S˜n } are not iid. Moreover the random variable ζn depends on which event occurs first: a retrial customer or a new arrival captures the server. Thus the exact distribution of the variable ζn is unknown, but we know that by construction, 0 < ζn ≤st max(ξ (1) , . . . , ξ (K) ), n ≥ 1,

(5)

where ≤st means the stochastic inequality. We exclude the value ζn = 0 in (5) because consider the dynamics of the system within a regeneration cycle. For the further analysis we accept the following ordering additional assumptions: S (1) ≤st S (2) ≤st · · · ≤st S (K) ,

(6)

ξ (1) ≤st ξ (2) ≤st · · · ≤st ξ (K) .

(7)

By assumption (7), class-1 orbital customers are “the most insist” to occupy server. Note that the order (7) means the ordering γ1 ≥ · · · ≥ γK , among the parameters of the exponential retrial times. Also note that condition (6) holds, for instance, for exponential and Weibull service times. Now we intro(l) (u) duce the iid sequences of the random variables, {Sn } and {Sn }, as the lower and upper bounds for the service times {Sˆn }: S (l) =st S (1) ,

(8)

S (u) =st S (K) + ξ (K) .

(9)

Note that indeed the lower bound is distributed as the minimal service time. By assumptions (6), (7) and by (5), it follows that, for n ≥ 1, Sn(l) ≤st Sˆn ≤st Sn(u) , n ≥ 1.

398

E. Morozov and K. Zhukova

By the stochastic monotonicity property [14], the buffered system with the interarrival time τ and service time S (l) is less loaded than the buffered system with service time {Sˆn } and the same input process. (For this monotonicity property the independence of the service times is not required. Some additional details can be found in [3].) By this reason, the buffered system is a minorant for the original retrial system. In particular the overflow probability in the minorant system is dominated by the same probability in the original retrial queue. Analogously, the buffered system with the same interarrival time τ and the iid service (u) times {Sn } dominates the number of customers in the original retrial system. This observation allows us to construct the lower and upper bounds for the asymptotics of the overflow probability PN as N → ∞. In the subsequent analysis we apply the large deviation asymptotics in the classic single-server system adapted from the paper [2]. This result assumes that the basic processes describing the dynamics of the original system are stationary. To be more precise, we consider the basic process Q = {Q(t), t ≥ 0}, where Q(t) is the number of customers in the system, in orbits and server, at instant t. We remind that the regenerations of the process Q, occur when an arrival finds the system completely empty. The regenerative process Q (and the system) is called positive recurrent if the mean regeneration cycle length is finite. Since the constructed buffered system with service time S (u) dominates the original retrial queue, the finitness of the mean regeneration cycle length in this dominating system implies that the mean cycle length in the original queue is finite as well. In the classic system the positive recurrence implies the existence of the stationary distribution of the corresponding regenerative process (if, additionally, τ is nonlattice) [1]. Recall that the stability criterion of the dominating single-server classic buffered system introduced above is [1,15]: λES (u) < 1. Since ES (u) = E(S (K) + ξ (K) ) =

(10) 1 1 + , μK γK

then the stability criterion (10) can be rewritten as 1 1 1 + < . μK γK λ

(11)

Moreover, condition (11) guarantees the positive recurrence of the minorant system with the service time S (l) . Noe that the analysis of a single-server system with classic and constant retrials can be found in particular in the works [4,13,17]. Now we define the main object of our analysis. First of all, for an arbitrary random variable X, we define the logarithmic (log) moment generating function: ΛX (θ) = log EeθX , θ > 0. Now we return to the service times in our system and define the value θˆ = sup(θ > 0 : EeθS < ∞),

(12)

Overflow Probability Asymptotics

399

which delimits the zone of the existence of the exponential moment generation function of the variable S. Taking into account (1) and (2), we obtain EeθS = Eeθ

K

i=1

S (i) 1(i)

=

K 

(i)

pi EeθS .

(13)

i=1

Then the parameter θˆ is defined as K    (i) pi EeθS < ∞ . θˆ = sup θ > 0 :

(14)

i=1

It is then evident that the component service times S (i) , i = 1, . . . , K, must have finite exponential moments to satisfy assumption θˆ < ∞. We will study the stationary overflow probability PN that the number of customers in the stationary retrial system exceeds a fixed level N during regenerative cycle. More exactly we consider the logarithmic asymptotics of this probability as N → ∞. It means that, for each value of N , we consider the stationary probability PN , then increase the value of N and again consider stationary probability, etc. The logarithmic asymptotic lower and upper bounds for the probability PN are given in the following statement. Theorem 1. Assume that conditions (6), (7) and (11) hold true. Then the overflow probability PN satisfies Λτ (−θ∗ ) ≤ lim sup N →∞

1 log PN ≤ Λτ (−θ∗ ), N

where θ∗ and θ∗ are defined, respectively, as   ˆ : Λτ (−θ) + ΛS (l) (θ) ≤ 0 θ∗ = sup θ ∈ (0, θ) and

  ˆ γK )) : Λτ (−θ) + ΛS (u) (θ) ≤ 0 . θ∗ = sup θ ∈ (0, min(θ,

(15)

(16)

(17)

Proof. The proof of the theorem repeats the main steps of the proof of Lemmas 1 and 3 from [3]. In particular, under condition (11) which provides the positive recurrence of the classic systems with service times S (l) and S (u) respectively, we can apply the basic result from the paper [2] concerning the stationary overflow probabilities, denoted by PlN and PuN , in the corresponding buffered systems, and then show that

1 log PlN = Λτ (−θ∗ ), N →∞ N lim

(18)

400

E. Morozov and K. Zhukova

lim

N →∞

1 log PuN = Λτ (−θ∗ ), N

(19)

where parameters θ∗ and θ∗ are defined in (16) and (17), respectively. It follows from discussion following formulas (8) and (9) that PlN ≤ PN ≤ PuN , and then we obtain the statement (15). Remark. Note that lim sup in (18) can be replaced by lim inf. Also we note that, by construction, the obtained bounds do not depend on the probabilities pi , i = 1, . . . , K.

3

Numerical Examples

In this section we present some numerical examples which show the estimated overflow probability obtained by means of the regenerative simulation in comparison with the theoretical bounds (15). Example 1. The exponential service times and three orbits. We consider M/GI/1 retrial system with the input rate λ = 1. There are three classes of customers with exponential service times S (1) , S (2) , S (3) with parameters μ1 = 1.5, μ2 = 1.2, μ3 = 1.25, respectively. This implies the required condition S (1) ≤st S (2) ≤st S (3) . Also we take pi = 1/3, i = 1, 2, 3; the retrial rates are γ1 = 20, γ2 = 15, γ3 = 10, implying ξ (1) ≤st ξ (2) ≤st ξ (3) . The chosen parameters satisfy condition (10), and thus the statements of Theorem 1 hold true. To estimate the overflow probability PN we sample 10000 regeneration cycles. Then we calculate the upper and lower bounds (15) for various values of N . The simulation results together with the bounds are presented in Fig. 1. To calculate the bounds (15), we need to find functions ΛS (l) (θ) = ΛS (1) (θ) and (3) (3) ΛS (u) (θ) = log Eeθ(S +ξ ) = ΛS (3) (θ) + Λξ(3) (θ). For the exponential τ and S (i) we easily find that: Λτ (θ) = log Eeθτ = log

λ , θ ∈ (0, λ), λ−θ

(20)

and ΛS (i) (θ) = log

μi , i = 1, 2, 3; θ ∈ (0, min μi ). μi − θ

(21)

Overflow Probability Asymptotics

401

Using (14) we find that θˆ = 1.25, and then using (20) and (21), we obtain the equation   ˆ : Λτ (−θ) + ΛS (1) (θ) ≤ 0 θ∗ = sup θ ∈ (0, θ)   ˆ : λ · μ1 ≤ 1 , = sup θ ∈ (0, θ) (22) λ + θ μ1 − θ which has solution θ∗ = 0.5. This gives Λτ (−θ∗ ) = −0.41.

Fig. 1. The estimated overflow probability in M/GI/1 retrial system and theoretical asymptotics vs. overflow level N ; exponential service times, logarithmic scale.

Then we calculate parameter θ∗ :   γ3 ∗ ˆ ≤0 θ = sup θ ∈ (0, min(θ, γ3 )) : Λτ (−θ) + ΛS (3) (θ) + log γ3 − θ   ˆ : γ3 · λ · μ3 ≤ 1 . = sup θ ∈ (0, θ) (23) γ3 − θ λ + θ μ3 − θ and obtain θ∗ = 0.13. This implies Λτ (−θ∗ ) = −0.126. Figure 1 shows the estimated overflow probability and theoretical bounds (15). Example 2. Weibull service times and three orbits. Again we consider an M/GI/1 retrial system with the input rate λ = 1/3 and three classes of

402

E. Morozov and K. Zhukova

customers with Weibull service times, denoted by Weibull(a, b), with the density, f (x) =

a  x a−1 −(x/b)a e , x ≥ 0, b > 0, a ≥ 1. b b

(24)

Note that the rate of Weibull(a, b) service time is μ=

1 1 = , ES b Γ (1 + a1 )

(25)

where Γ is the Gamma function. We take 1 (2) 1 (3) , S =st Weibull 2 , , S =st Weibull (2 , 1 ), S (1) =st Weibull 2 , 3 2 so that the ordering S (1) ≤st S (2) ≤st S (3) , holds true. According to (25), μ1 = 3.39, μ2 = 2.258, μ3 = 1.129. Also we take pi = 1/3, i = 1, 2, 3, and choose retrial rate parameters as γ1 = 10, γ2 = 5, γ3 = 2, implying ξ (1) ≤st ξ (2) ≤st ξ (3) . Note that condition (10) is satisfied and the statements of Theorem 1 hold. As in previous example, we estimate the probability PN using 100000 regeneration cycles, and then calculate the bounds of the overflow probability using (15). In general, it is a hard problem to derive function ΛS (i) (θ) in an explicit form for the non-exponential S (i) . However for Weibull distribution this function is available in some cases. In our setting, ΛS (l) = ΛS (1) , so we obtain by [11], ∞ ΛS (1) (θ) = log

2

18xe−9x

+θx



θ √ θ2 dx = log 1 + πe 36 (1 − Φ(−θ/6)) , 6

(26)

0

where 2 Φ(x) = √ π

x

2

e−t dt.

0

Using (20) and (26) we must calculate   ˆ : Λτ (−θ) + ΛS (1) (θ) ≤ 0 θ∗ = sup θ ∈ (0, θ)

  θ √ θ2 λ 36 · 1+ πe (1 − Φ(−θ/6)) ≤ 1 . = sup θ > 0 : λ+θ 6

(27)

Overflow Probability Asymptotics

403

Fig. 2. The estimated overflow probability in M/GI/1 retrial system and theoretical asymptotics vs. overflow level N ; Weibull service times; logarithmic scale.

Note, that in this example θˆ = +∞. After some algebra, we find that θ∗ = 4.23, implying Λτ (−θ∗ ) = −2.66. Next we derive the upper bound ΛS (u) = ΛS (3) and obtain

∞ 2 θ √ θ2 ΛS (3) (θ) = log 2xe−x +θx dx = log 1 + πe 4 (1 − Φ(−θ/2)) . (28) 2 0

It remains to calculate parameter θ∗ satisfying the equation   γ3 ∗ ˆ ≤0 θ = sup θ ∈ (0, min(θ, γ3 )) : Λτ (−θ) + ΛS (3) (θ) + log γ3 − θ     λ θ √ θ2 γ3 = sup θ ∈ (0, γ3 ) : · · 1+ πe 4 (1 − Φ(−θ/2)) ≤ 1 . γ3 − θ λ + θ 2 After some algebra we find that θ∗ = 0.73, and it gives Λτ (−θ∗ ) = −1.17. As in the previous experiment, Fig. 2 shows that the estimated probability is located between the theoretical bounds being closer to the upper bound. Example 3. The exponential service times and two orbits. Now we consider an M/GI/1 retrial system with two classes and the input rate λ = 1/2. Service times are exponential and ordered as S (1) ≤st S (2) with the rates μ1 = 10, μ2 = 1.25. We also take the retrial rates γ1 = 20, γ2 = 2, implying the ordering ξ (1) ≤st ξ (2) . As above, the chosen parameters satisfy stability condition (10).

404

E. Morozov and K. Zhukova

First, we estimate the overflow probability PN for two sets of the probabilities pi , i = 1, 2. The set p1 = 0.2, p2 = 0.8 represents the scenario when class-2 customers have (stochastically) bigger service times, that is S (2) ≥st S (1) , and rarer retrial attempts, ξ (2) ≥st ξ (1) , and thus attempt to enter the server more frequently than class-1 customers. In this case the system is more loaded than that under the opposite case with p1 = 0.8, p2 = 0.2.

Fig. 3. The estimated overflow probabilities and the theoretical asymptotics vs. the overflow level N ; exponential service times; two orbits; logarithmic scale.

Then we calculate the theoretical result (15). We recall that, by construction, the theoretical bounds do not depend on p1 , p2 . As in example 1, we obtain θˆ = 1.25. Using (20) and (21) we obtain   μ1 ˆ : λ ≤1 , (29) θ∗ = sup θ ∈ (0, θ) λ + θ μ1 − θ and solution θ∗ = 0.37. This gives Λτ (−θ∗ ) = −0.56. Finally, we calculate θ∗ using the following equation:   λ μ2 ˆ : γ2 ≤1 . (30) θ∗ = sup θ ∈ (0, θ) γ2 − θ λ + θ μ2 − θ Its solution is θ∗ = 1.25, implying Λτ (−θ∗ ) = −1.23. The results based on 10000 regeneration cycles are given in Fig. 3. The simulation results indicate an expected shift of the estimate to the upper bound for the more loaded system.

Overflow Probability Asymptotics

4

405

Conclusion

A single-server multiclass retrial system with constant class-dependent retrial rates is considered in the stationary regime which is defined in the terms of the regeneration theory. The stationary overflow probability that the number of customers in the system reaches a high level N during a regeneration cycle is studied. It is shown that the original retrial system can be treated as buffered system with the dependent service times of a special type. This interpretation allows further to compare the original retrial system with the classic buffered systems, which in turn can be analysed using the large deviation result from [2]. Based on this approach, the lower and upper bounds for the asymptotic of the large deviation probability are constructed as N → ∞. The tightness of the bounds is illustrated by a few numerical examples.

References 1. Asmussen, S.: Applied Probability and Queues, 2nd edn. Springer, New York (2003). https://doi.org/10.1007/b97236 2. Sadowsky, J.S.: Large deviations theory and efficient simulation of excessive backlogs in a GI/GI/m queue. IEEE Trans. Autom. Control 36(12), 1383–1394 (1991) 3. Morozov, E., Zhukova, K.: A large deviation analysis of retrial models with constant and classic retrial rates. Perform. Eval. 135, 102021 (2019) 4. Morozov, E., Rumyantsev, A., Dey, S., Deepak, T.G.: Performance analysis and stability of multiclass orbit queue with constant retrial rates and balking. Perform. Eval. (2019). https://doi.org/10.1016/j.peva.2019.102005 5. Kim, J., Kim, B.: Tail asymptotics for the queue size distribution in the MAP/G/1 retrial queue. Queueing System. 66, 79–94 (2010) 6. Kim, J., Kim, B., Ko, S.-S.: Tail asymptotics for the queue size distribution in an M/G/1 retrial queue. J. Appl. Probab. 44, 1111–1118 (2007) 7. Morozov, E., Zhukova, K.: An upper bound of the large deviation probability in multi-server constant retrial rate system. In: Vishnevskiy, V.M., Samouylov, K.E., Kozyrev, D.V. (eds.) DCCN 2019. CCIS, vol. 1141, pp. 325–337. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-36625-4 26 8. Artalejo, J.R., Resing, J.A.C.: Mean value analysis of single server retrial queues. Asia-Pac. J. Oper. Res. 27(3), 335–345 (2010) 9. Thorisson, H.: Coupling, Stationarity, and Regeneration. Springer, New York (2000) 10. Buijsrogge, A., de Boer, P.T., Rosen, K., Scheinhardt, W.: Large deviations for the total queue size in non-Markovian tandem queues. Queueing Syst. 85(3–4), 305–312 (2017). https://doi.org/10.1007/s11134-016-9512-z 11. Gradshteyn, I.S., Ryzhik, I.M.: Table of Integrals, Series and Products. Elsevier, Amsterdam (2007) 12. Chang, C.-S.: Performance Guarantees in Communication Networks. Springer, London (2000). https://doi.org/10.1007/978-1-4471-0459-9 13. Morozov, E.: A multiserver retrial queue: regenerative stability analysis. Queueing Syst. 56, 157–168 (2007) 14. Whitt, W.: Comparing counting processes and queues. Adv. Appl. Probab. 13, 207–220 (1981)

406

E. Morozov and K. Zhukova

15. Altman, E., Borovkov, A.A.: On the stability of retrial queues. Queueing Syst. 26, 343–363 (1997) 16. Nekrasova, R.: On verification of stability of multi-orbit system with general retrials: simulation approach. In: Vishnevskiy, V.M., Samouylov, K.E., Kozyrev, D.V. (eds.) DCCN 2019. CCIS, vol. 1141, pp. 401–412. Springer, Cham (2019). https:// doi.org/10.1007/978-3-030-36625-4 32 17. Avrachenkov, K., Morozov, E., Nekrasova, R., Steyaert, B.: Stability analysis and simulation of N-class retrial system with constant retrial rates and Poisson inputs. Asia-Pacific J. Oper. Res. 31(2) (2014) https://doi.org/10.1142/ S0217595914400028

Wireless Channel Modeling and Simulation with K Distribution S. G. Shorokhov(B) Peoples’ Friendship University of Russia (RUDN University), 6 Miklukho-Maklaya St, Moscow 117198, Russian Federation [email protected] Abstract. We study modeling of wireless channel with fading and shadowing effects using K distribution with modified Bessel function of the second kind with half integer order. This allows us to obtain probability density function and cumulative distribution function in closed form in terms of elementary functions and simplifies the calculation of exact average bit error rate. The problem of Monte Carlo simulation using random variables with K distribution is also addressed. Keywords: Wireless channel · K distribution error rate · Monte Carlo method

1

· Bessel function · Bit

Introduction

K distribution was introduced in [10] for describing the statistics of radiation scattered by media with a wide range of length scales. K distribution can be derived from the product of two random variables, where one variable has a chi distribution and another variable has a complex Gaussian distribution [24]. K distribution is widely used for modeling diverse scattering phenomena such as tropospheric propagation of radio waves, various types of radar clutter, optical scintillation from the atmosphere [3], in synthetic-aperture radar (SAR) imagery [25], radiative heat transfer [15] and also in wireless communication to model composite fading and shadowing effects [18,20]. One of the most important approaches to stochastic simulation is Monte Carlo method. Problems in communication theory form one of the most important domains of application for Monte-Carlo method [19]. We study the problem of wireless channel modeling with K distribution and Monte Carlo method, when modified Bessel function in probability density of K distribution is of half integer order.

2

Model of Shadowed Fading Channel

Basically, the model for shadowed fading channel can be described by the following equation [18] r = A B s + n, (1) The publication has been prepared with the support of the “RUDN University Program 5–100”. The research was funded by RFBR, grant No. 19-08-00261. c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 407–421, 2020. https://doi.org/10.1007/978-3-030-66242-4_32

408

S. G. Shorokhov

where r is the received signal, s is the transmitted signal, n is the Gaussian distributed noise with zero mean, A and B represent the fluctuations in the channel due to fading and shadowing. Fading in wireless channel (1) can be described using various stochastic models, such as Rayleigh fading, Rician fading, Nakagami fading, etc. [18]. When the envelope of the signal is Rayleigh distributed, its power has an exponential probability density function (PDF), given by   1 p exp − U (p) , (2) fF (p) = p0 p0 

where p0 is the average power of the received signal, U (p) = 1l{p>0} =

1, p > 0, . 0, p ≤ 0.

In wireless communications average power often varies randomly due to the existence of shadowing by surrounding terrain, mountains, buildings, etc. The density function of the average power can be modeled in terms of lognormal or gamma distribution [1,2,17]. In model with gamma distribution, the PDF of the shadowing power is equal to   z z c−1 exp − fS (z) = c U (z) , c > 0, (3) y0 Γ (c) y0 where parameters c and y0 are related to the average power and standard deviation of shadowing. Taking into account the simultaneous effect of fading and shadowing on the received signal, the PDF of the received signal power in (1) can be expressed as ∞ fF (p | z) fS (z) dz,

f (p) =

(4)

0

where fF is the PDF of channel power, fS is the PDF of the mean power. Rayleigh-lognormal distribution [8], which is a mixture of Rayleigh and lognormal distributions, is probably the most appropriate description of signal envelope in fading-shadowing wireless channels [22]. But the complicated form of its PDF motivates to approximate lognormal distribution by gamma distribution and proceed with K distribution, which is a mixture of Rayleigh (2) and gamma (3) distributions.

3

K Distribution and Modified Bessel Functions

Random variable has K distribution with shape α > 0 and scale λ > 0, if its PDF and cumulative distribution function (CDF) are equal to [3]     x (α−1)/2 x 2 fK (x) = Kα−1 2 U (x) , (5) λΓ (α) λ λ

Wireless Channel Modeling and Simulation with K Distribution

   x 2  x α/2 FK (x) = 1 − Kα 2 U (x) , Γ (α) λ λ

409

(6)

respectively, where Γ is the gamma function, Kν (x) is the modified Bessel function of the second kind of order ν. Mean and variance of K distributed random variable X are equal to E [X] = α λ, V [X] = λ2 α (α + 2) . The modified Bessel function of the second kind Kν (x) in (5) and (6) is a solution of the modified Bessel’s ordinary differential equation x2

d2 w dw  2 − x + ν2 w = 0 +x dx2 dx

(7)

and, basically, can’t be expressed in terms of elementary functions [12]. But in the case of half integer order ν ν = ± 21 , ± 32 , ... functions Kν (x) can be expressed through elementary functions, for example:     1 π −x π e , K 32 (x) = + 1 e−x , ... K− 12 (x) = K 12 (x) = (8) 2x 2x x Modified Bessel functions of the second kind of higher half integer orders keep the same structure and are represented in the following form [7]  Kn+ 12 (x) =

π −x

(n + k)! e , n ≥ 0. k 2x k! (n − k)! (2x) n

(9)

k=0

For x > 0 and ν > 0 function Kν (x) is positive and monotonically decreasing (see plots of modified Bessel functions of the second kind of half integer orders in Fig. 1).

4

K-Fading Channel in Half Integer Case

If we set b = √2λ and c = α in PDF (5), we receive the PDF of power in shadowed fading channel (1) in the following form [18] 2 fK (p) = Γ (c)

 c+1 c+1 b √ p 2 −1 Kc−1 (b p) U (p) , 2

(10)

where b is a parameter related to the average power, c is a positive parameter related to the effective number of scatterers. Rayleigh-lognormal and K distributions are similar, but K distribution has a simpler form, which makes it possible to obtain closed-form solutions in the calculation of bit error rates, diversity effects, etc. The calculations can be further simplified in half integer case c = n + 12 , where n ∈ N or n = 0.

410

S. G. Shorokhov

Fig. 1. Modified Bessel functions of the second kind Kν (x).

In half integer case PDF (10) takes the form  n+ 32 n 1 b √ p 2 − 4 Kn− 12 (b p) U (p) . (11) fK 2  √ When n = 0, we take into account equalities (8) and value Γ 12 = π to receive expression for the first half-integer PDF (n+ 12 )

2 (p) = Γ n + 12 

√ b (1) fK2 (p) = √ e−b p U (p) . 2 p

(n+ 1 ) Fig. 2. Probability density functions fK 2 (p) in half integer case.

(12)

Wireless Channel Modeling and Simulation with K Distribution

411

When n ∈ N, gamma function for half integer argument is equal to   1 (2n − 1)!! √ Γ n+ π, = 2 2n so from (9) we obtain that √ Kn− 12 (b p) =



π −b√p

(n + k − 1)! √ e  √ k , 2b p k=0 k! (n − k − 1)! 2b p n−1

and PDF (11) can be expressed in terms of elementary functions as follows (n+ 1 ) fK 2 (p) =

√ (2n − k − 2)! bk+2 k 1 e−b p p 2 U (p) . n−k (2n − 1)!! (n − k − 1)! k! 2 n−1

(13)

k=0

In particular, from (13) we receive the following representations for half integer PDF: √ b2 (3) (14) fK2 (p) = e−b p U (p) , 2 √ b3 √ 1 b2 (5) + (15) p e−b p U (p) . fK2 (p) = 3 2 2 (n+ 1 ) Plots of functions fK 2 (p) for various values of n and b are shown in Fig. 2. The value of b is determined by selected value p of average power in the channel.

(n+ 1 ) Fig. 3. Cumulative distribution functions FK 2 (p) in half integer case.

In half integer case CDF of K distribution can also be essentially simplified. Using representation (9) we receive CDF of power in shadowed K-faded channel

412

S. G. Shorokhov

for half integer case (n ≥ 0): (n+ 1 ) FK 2 (p) = 1 −



k (2n − k)!bk 1 e−b p p 2 U (p) . n−k (2n − 1)!! k! (n − k)!2 n

(16)

k=0

(n+ 1 ) Plots of distribution functions FK 2 (p) for various values of n and b are demonstrated in Fig. 3.

5

Bit Error Rate for K-Fading Channel in Half Integer Case

Closed form expressions for power PDF and CDF in half integer case simplify calculation of miscellaneous performance criteria, for instance, the capacity of wireless channel [13]. Average bit error rate (BER) is an important measure for performance analysis of a digital wireless channel. Evaluation of BER for K-fading channel under DPSK (differential phase shift keying) scheme requires calculation of the integral ∞ Pe =

Pe (x) fK (x) dx 0

with signal dependent BER Pe (x) given by expression Pe (x) =

1 −s x e , 2

where s > 0 is a constant, depending on parameters of the wireless channel. Explicit exact expression for BER under DPSK [2,11,16] includes sophisticated special functions and do not allow straightforward determination of channel parameters and interpretation of results. An alternative is the approximation of power PDF of K-fading channel using orthogonal polynomials [21] with further determination of the analytical closed form BER of approximate model. For the first half integer order c = 12 the PDF of K-fading channel is determined by (12) and BER of the channel is equal to the integral ( 12 )

Pe

b = 4

∞ 0

√ 1 √ e−s p−b p dp p

Using the substitution p = y 2 , dp = 2ydy we obtain ( 12 )

Pe

b = 2

∞

−s y 2 −by

e 0

b b2 dy = e 4s 2

∞ 0

(17) b

2

e−s (y+ 2s ) dy

Wireless Channel Modeling and Simulation with K Distribution

The next substitution u=





b 2s y + 2s



results in equality ( 12 )

Pe

1 b2 = √ e 4s 2s

, du = ∞

e−



u2 2

2sdy

413

(18)

du.

√b 2s

Let us denote by J0 the integral   ∞

∞ √ √ u2 b

e− 2 du = 2πΦ (u) b = 2π Φ − √ J0 = , √ 2s 2s

(19)

√b 2s

x u2 where Φ (x) = √12π −∞ e− 2 du is standard normal CDF. Thus BER of wireless channel for the first half integer order is represented by the following simple formula    b π b2 b ( 12 ) e 4s Φ − √ . (20) Pe = 2 s 2s Dependence of average BER on parameters b and s for the first half integer order is characterized by the surface in Fig. 4.

Fig. 4. Average BER surface for K-fading channel when c = 12 .

For the next half integer order c = 32 the PDF of K-fading channel is determined by (14) and BER is equal to ∞ √ b2 ( 32 ) e−s p−b p dp. Pe = 4 0

414

S. G. Shorokhov

Using substitutions (17) and (18) we receive that ( 32 )

Pe

∞

b2 = 4s

2

− u2



e √b 2s

b u− √ 2s

 du

Using notation J1 for the integral ∞ J1 =

2

− u2

e

∞ 

∞  u2 u2 b2 udu = d −e− 2 = −e− 2 b = e− 4s , √

√b 2s

√b 2s

(21)

2s

we obtain that b2 (3) Pe 2 = 4s

∞   1  b 3 u2 √ d −e− 2 − J0 2 2s

√b 2s

=

b2 − b 2 e 4s − 4s



π 2



b √ 2s

3

  b Φ −√ 2s

Average BER surface for half integer order c = 32 in Fig. 5 differs from average BER surface for previous half integer order c = 12 .

Fig. 5. Average BER surface for K-fading channel when c = 32 .

For the general half integer case c = n + 12 , n ∈ N the PDF of K-fading channel is determined by (13) and BER is equal to (n+ 1 ) Pe 2 =

∞ 0

1 −s p (n+ 12 ) e fK (p) dp 2

Wireless Channel Modeling and Simulation with K Distribution

415

∞ n−1

(2n − k − 2)! bk+2  √ k 1 1 = e−s p−b p p 2 dp n−k 2 (2n − 1)!! (n − k − 1)! k! 2 k=0

(22)

0

Application of substitutions (17) and (18) to the integrals in right hand side of (22) results in equality ∞

√ −s p−b p

e

∞

b2

e 4s

k 2

p dp =

k

k

2 2 s 2 +1

0

e−

u2 2

√b 2s



b u− √ 2s

k+1 du

The integrand in the right hand side of equality is the product of an exponent and a polynomial, so the calculation of BER for general half integer order is reduced to the calculation of integrals ∞ Jm =

e−

u2 2

um du, m ≥ 0.

√b 2s

For m = 0 and m = 1 the integrals Jm are already calculated in (20) and (21). For m > 1 the integral Jm can be calculated using the following recurrent formula: Jm

∞  ∞

∞  2 u2 u2

− u2 m−1 + (m − 1) = d −e u e− 2 um−2 du = −e− 2 um−1 b √b 2s

√ 2s

√b 2s

∞ + (m − 1)

e−

u2 2

b2

um−2 du = e− 4s

√b 2s



b √ 2s

m−1 + (m − 1) Jm−2

(23)

For instance, for half integer order c = 52 the PDF is determined by (15), so BER is equal to ∞ √ b2 √ ( 52 ) Pe = e−s p−b p (1 + b p) dp. 12 0

After substitutions (17) and (18) the integral is reduced to ( 52 )

Pe

b2 = 12s

∞



2

− u2

e √b 2s

     bu2 b b2 b2 √ + 1− √ du. u− 1− s 2s 2s 2s

According to (23) ∞ J2 =

2

− u2

e √b 2s

2

2

− b4s

u du = e

  2 √ b b − b4s b √ + J0 = e √ + 2π Φ − √ , 2s 2s 2s

416

S. G. Shorokhov

so finally average BER of K-fading channel for half integer order c = sented by the formula    3  2 √ b b2 b ( 52 ) − b4s √ e + 2π Φ − √ Pe = 12s 2s 2s

5 2

is repre-

with average BER surface in Fig. 6.

Fig. 6. Average BER surface for K-fading channel when c = 52 .

6

Monte Carlo Simulation with K Distribution

Monte Carlo method implies generation of random numbers with given probability distribution [14]. The most straightforward way to generate a non-uniform random variable is by inversion of its CDF: if given distribution is characterised by CDF F with known closed form inverse function (quantile function) F −1 and X is a random variable with continuous uniform distribution in the interval (0, 1), then Y = F −1 (X) is a random variable with given probability distribution. For distributions with no closed-form inverse CDF one has to solve equation F (x) = y for y ∈ (0, 1) using approximations or numerical methods [6]. To find the quantile function of K distribution in general case, one has to solve transcendental equation  c  √ c b 2 x 2 Kc b x = y, y ∈ (0, 1) . (24) FK (x) = 1 − Γ (c) 2 Equation (24) can be solved using various approaches [9].

Wireless Channel Modeling and Simulation with K Distribution

417

The basic version of Newton’s method for solving (24) gives the following iterative process: xl+1 = xl −

FK (xl ) − y FK (xl ) − y = xl − d fK (xl ) dx FK (xl )

 c c  √ (1 − y) Γ (c) − 2 2b xl2 Kc b xl , l ≥ 0. = xl −  √  c+1 c−1 2 2b xl 2 Kc−1 b xl

(25)

The iterative process (25) stops when the required accuracy ε > 0 is achieved, i.e. |FK (xl ) − y| < ε, or when absolute or relative is below

error approximation

xl+1

the given tolerance > 0, i.e. |xl+1 − xl | < or xl − 1 < . The Newton’s method of quantile function construction requires an initial starting point x0 = x0 (y) with good accuracy and a sufficiently efficient algorithm for modified Bessel function Kc and Kc−1 calculation in (25). Existence of approximations to the quantile function of K distribution has not been investigated, so the determination of an initial guess requires either application of general considerations [26], or approximation of K distribution by similar distribution with known quantile function. For instance, general K distribution can be approximated by Rayleigh or Weibull distribution, or K distribution √ with parameter c = 12 . In the latter case CDF is equal to FK (x) = 1 − be−b x and   2 −1 the quantile function is equal to x = FK (y) = 1b ln 1b (1 − y) . Nowadays digital signal processing is often performed in Python [5], so the simulation with K distribution is carried out in Python. Efficient calculation of modified Bessel functions of the second kind Kν (x) in half integer case ν = n + 12 can be implemented in Python using formula (9). As an alternative, modified Bessel functions of the second kind are implemented in SciPy library [23] as wrappers for AMOS package routines in Fortran [4]. Performance of modified Bessel function calculation for half integer case is tested by execution of 1 million modified Bessel function calls with results in Table 1 (execution time in milli-seconds). Table 1. Execution time of modified Bessel function calls for half integer case. ν

1.5

2.5

3.5

4.5

5.5

6.5

7.5

8.5

9.5

10.5

kvν (x) 107.7 195.5 181.7 194.5 210.4 197.2 187.6 197.1 198.3 205.7 Kν (x) 26.4

29.7

49.3

72.4

98.9

116.9 138.0 153.9 175.1 209.2

In Table 1 ν is the order of the modified Bessel function of the second kind, kvν (x) corresponds to modified Bessel function implementation in SciPy and Kν (x) corresponds to modified Bessel function implementation in Python using formula (9).

418

S. G. Shorokhov

Table 1 demonstrates that for small half integer orders ν implementation, based on formula (9), is essentially more efficient than implementation in SciPy, but for larger half integer orders execution time is almost the same. If the order of modified Bessel function of the second kind is not half integer, execution time of calls is essentially larger as it follows from Table 2. Table 2. Execution time of modified Bessel function calls for non half integer case. ν

1.51

2.51

3.51

4.51

5.51

6.51

7.51

8.51

9.51

10.51

kvν (x) 373.0 433.7 445.7 446.7 438.3 441.6 441.3 448.6 456.7 459.4

Thus, use of formula (9) for modified Bessel function implementation can bring essential gain in efficiency of computing. In half integer case the problem of Monte Carlo simulation with K distribution can be easily implemented using CDF inversion approach and Newton’s iterative method. Algorithm 1) describes Monte Carlo simulation with K distribution and subsequent construction of empirical density function from the simulated values. Algorithm 1 for Monte Carlo simulation with K distribution and construction of empirical density function is implemented in Python and produces empirical density function in Fig. 7 similar to theoretical density function of K distribution.

Fig. 7. Empirical and theoretical densities for K distribution

Since samples in Monte Carlo method are generated independently of each other, Monte Carlo simulation is naturally suited to parallel computing. So Monte Carlo simulation with K distribution can be implemented using modern multi-core processors or graphics processing units (GPU).

Wireless Channel Modeling and Simulation with K Distribution

419

Algorithm 1: Construction of empirical density with K distribution. Data: number of trials N , number of bins M , order c = n + 12 , n ∈ IN, accuracy ε > 0 (or error tolerance  > 0); (n+ 1 ) Result: empirical PDF ρK 2 (x) of random variable with K distribution 1 2

3 4

for i ← 1 to N do create a pseudo-random number yi , uniformely distributed on (0, 1); (n+ 1 ) ˜0 ← x0 (yi ), /* solve equation FK 2 (xi ) = yi for xi ∈ (0, +∞) */ x l←0; /* an initial approximation */ repeat /* Newton’s method */ l ← l + 1; √ k k b

5 6 7 8 9 10

x ˜l ← x ˜l−1 −



n

2 x ˜l−1

;

until |FK (˜ xl ) − y| < ε (|˜ xl − x ˜l−1 | < ); /* accuracy/error tolerance */ xi ← x ˜l ; end m ← max {xi }N i=1 ; m divide the half-interval (0, m] into M equal parts of length h = M and N calculate ρj as the number of values from the set {xi }i=1 , that belong to half-intervals of the form ((j − 1) h, j h] for j = 1, M ;

11

(n+ 12 )

ρK

7

x ˜l−1

(2n−k)!b k=0 k!(n−k)!2n−k k n−1 (2n−k−2)! bk+2 x ˜2 k=0 (n−k−1)! k! 2n−k l−1

(2n−1)!!(1−y)e

⎧ ⎨ 0, x ≤ 0, (x) ← N1 ρj , (j − 1) h < x ≤ j h, j = 1, M , ⎩ 0, x > m

Conclusion

Investigation of wireless channel, modeled by K distribution with modified Bessel function of half integer order, gives an opportunity to receive the framework with closed form PDF and CDF expressions and simplifies calculation of wireless channel performance measures and simulation of wireless channel performance. Consideration of Bessel functions of half integer orders may be useful in other models of wireless channel with fading and shadowing effects.

References 1. Abdi, A., Kaveh, M.: K distribution: an appropriate substitute for rayleighlognormal distribution in fading-shadowing wireless channels. Electron. Lett. 34(9), 851–852 (1998). https://doi.org/10.1049/el:19980625 2. Abdi, A., Kaveh, M.: Comparison of DPSK and MSK bit error rates for k and rayleigh-lognormal fading distributions. IEEE Commun. Lett. 4(4), 122–124 (2000). https://doi.org/10.1109/4234.841317 3. Abraham, D.A.: Underwater Acoustic Signal Processing. MASP. Springer, Cham (2019). https://doi.org/10.1007/978-3-319-92983-5

420

S. G. Shorokhov

4. Amos, D.E.: Algorithm 644: a portable package for Bessel functions of a complex argument and nonnegative order. ACM Trans. Math. Softw. 12(3), 265–273 (1986). https://doi.org/10.1145/7921.214331 5. Charbit, M.: Digital Signal Processing with Python Programming. Wiley, Hoboken, December 2016. https://doi.org/10.1002/9781119373063 6. Dagpunar, J.S.: Simulation and Monte Carlo. Wiley, Hoboken, January 2007. https://doi.org/10.1002/9780470061336 7. Gradshteyn, I., Ryzhik, I.: Table of Integrals, Series, and Products, 7th edn. Elsevier (2007). https://doi.org/10.1016/c2010-0-64839-5 8. Hansen, F., Meno, F.: Mobile fading–rayleigh and lognormal superimposed. IEEE Trans. Veh. Technol. 26(4), 332–335 (1977). https://doi.org/10.1109/t-vt.1977. 23703 9. Hauser, J.R.: Numerical Methods for Nonlinear Engineering Models. Springer, Netherlands (2009). https://doi.org/10.1007/978-1-4020-9920-5 10. Jakeman, E., Pusey, P.N.: Significance of K distributions in scattering experiments. Phys. Rev. Lett. 40(9), 546–550 (1978). https://doi.org/10.1103/physrevlett.40. 546 11. Kiasaleh, K.: Performance of coherent DPSK free-space optical communication systems in k-distributed turbulence. IEEE Trans. Commun. 54(4), 604–607 (2006). https://doi.org/10.1109/tcomm.2006.873067 12. Korenev, B.G.: Bessel Functions and Their Applications. CRC Press, Boca Raton, July 2002. https://doi.org/10.1201/b12551 13. Laourine, A., Slim Alouini, M., Affes, S., Stephenne, A.: On the capacity of generalized-k fading channels. IEEE Trans. Wireless Commun. 7(7), 2441–2445 (2008). https://doi.org/10.1109/twc.2008.070103 14. Metropolis, N., Ulam, S.: The Monte Carlo method. J. Am. Stat. Assoc. 44(247), 335–341 (1949). https://doi.org/10.1080/01621459.1949.10483310 15. Modest, M.: Radiative Heat Transfer, 3rd edn. Elsevier (2013). https://doi.org/ 10.1016/c2010-0-65874-3 16. Samimi, H.: Performance analysis of free-space optical links with transmit laser selection diversity over strong turbulence channels. IET Commun. 5(8), 1039–1043 (2011). https://doi.org/10.1049/iet-com.2010.0075 17. Shankar, P.M.: Error rates in generalized shadowed fading channels. Wireless Pers. Commun. 28(3), 233–238 (2004). https://doi.org/10.1023/B:wire.0000032253. 68423.86 18. Shankar, P.M.: Fading and Shadowing in Wireless Systems. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-53198-4 19. Shreider, Y. (ed.): The Monte Carlo Method: The Method of Statistical Trials. Elsevier (1966). https://doi.org/10.1016/c2013-0-01870-1 20. Simon, M.K., Alouini, M.S.: Digital Communication over Fading Channels, 2nd edn. Wiley, Hoboken, November 2004. https://doi.org/10.1002/0471715220 21. Singh, R.K., Kumar, S.K.: A novel approximation for k distribution: closed-form BER using DPSK modulation in free-space optical communication. IEEE Photonics J. 9(5), 1–14 (2017). https://doi.org/10.1109/jphot.2017.2746763 22. St¨ uber, G.L.: Principles of Mobile Communication. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-55615-4 23. Virtanen, P., et al.: SciPy 1.0: fundamental algorithms for scientific computing in python. Nature Methods 17(3), 261–272 (2020). https://doi.org/10.1038/s41592019-0686-2 24. Ward, K.: Compound representation of high resolution sea clutter. Electron. Lett. 17(16), 561 (1981). https://doi.org/10.1049/el:19810394

Wireless Channel Modeling and Simulation with K Distribution

421

25. Ward, K., Tough, R., Watts, S.: Sea Clutter: Scattering, the K Distribution and Radar Performance. Institution of Engineering and Technology, 2nd edition edn. (2013). https://doi.org/10.1049/pbra025e 26. Yu, C., Zelterman, D.: A general approximation to quantiles. Commun. Stat. Theory Methods 46(19), 9834–9841 (2016). https://doi.org/10.1080/03610926.2016. 1222433

Melanoma Detection Computer System Development with Deep Neural Networks Eugene Yu. Shchetinin1 , Leonid A. Sevastianov2,3 , Dmitry S. Kulyabov2,3(B) , Edik A. Ayryan3 , and Anastasia V. Demidova2 1

3

Financial University, Government of the Russian Federation, Moscow, Russian Federation [email protected] 2 Peoples’ Friendship University of Russia (RUDN University), Moscow, Russian Federation {sevastianov-la,kulyabov-ds,demidova-av}@rudn.ru Joint Institute for Nuclear Research, Dubna, Russian Federation [email protected]

Abstract. This paper examines the problem of detecting skin malignancies, in particular, melanoma, from the analysis of dermoscopic images using deep learning methods. For this purpose, a deep convolutional neural network architecture was developed, which was used to process dermoscopic images of various skin lesions contained in the HAM10000 data set. The studied images were previously cleared of noise and other contaminants for processing by neural networks. In addition, since the disease classes are unbalanced, a number of transformations have been made to balance them. At the first stage, the images were divided into two classes: melanoma and benign tumor. At the second stage, all images of skin injuries were grouped into seven classes. Computer experiments on the use of the constructed deep neural network on the data obtained in this way have shown that the proposed approach provides 91%. Keywords: Melanoma neural networks

1

· Classification · Deep learning · Convolutional

Introduction

Melanoma is a deadly form of skin cancer that is often undiagnosed or misdiagnosed as a benign skin lesion. Its early and accurate detection is extremely important, because patients lives depend on it. In their practice, doctors are accustomed to rely on their professional experience and evaluate the injuries of each patient on the basis of a personal examination. However, such a system for detecting skin lesions is time-consuming and requires time and resources [7,18,24]. In addition, the process of manual dermatoscopy is more prone to diagnosis errors, requires many years of experience in complex situations and a huge number of visual studies of similarities and differences between various skin lesionss [13,20]. c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 422–434, 2020. https://doi.org/10.1007/978-3-030-66242-4_33

Melanoma Detection Computer System Development

423

Clinical studies allow us to obtain an accuracy of the diagnosis of melanoma from 65 to 80%, which was a good result for some time [9,16]. However, modern research claims that the use of dermoscopic images in diagnosis significantly increases the accuracy of diagnosis of skin lesions. However, the visual differences between melanoma and benign skin lesions can be very small, making diagnosis difficult even for an expert doctor. Recent advances in the use of artificial intelligence methods in the analysis of medical images have allowed us to consider the development of intelligent medical diagnostics systems based on visualization as a very promising direction that will help the doctor in making more effective decisions about the health of patients and making a diagnosis at an early stage and in adverse conditions [5]. In this paper, we investigate an approach to solving the problem of classification of skin diseases, namely, detection of melanoma, based on deep learning methods. For this purpose, the architecture of a deep convolutional neural network was developed, which was applied to the processing of dermoscopic images of various skin lesions contained in the set of dermoscopic images HAM10000 [6]. The studied data was previously processed to eliminate noise, contamination, and change the size and format of images. In addition, since the disease classes are unbalanced, a number of transformations were performed to balance them. The data obtained in this way were divided into two classes: Melanoma and Benign. Computer experiments on the use of a built deep neural network on the data obtained in this way have shown that the proposed approach provides an accuracy of 91% on the test sample, which exceeds similar results obtained by other algorithms.

2

Modern Results in Computer Recognition of Dermatoscopic Images

Most classical methods in the field of melanoma classification rely on manual selection of features such as the type of lesion (primary morphology), lesion configuration (secondary morphology), color, distribution, shape, texture, and uneven borders of the pigment spot [21] then, after extracting the main characteristics of images, machine learning methods such as the K-nearest neighbor (k-NN) algorithm, logistic regression, decision trees, and others are used to solve the classification problem [11]. Modern computer research on the diagnosis of skin diseases in order to detect melanoma actively implements deep learning methods and is aimed at improving existing and developing new models of deep neural networks, primarily convolutional neural networks (CNN) [14,27]. Esfahani et al. [19] proposed a CNN architecture for the diagnosis of melanoma, where clinical images were pre-processed in such a way as to reduce the illumination of the image. Research results have shown that the proposed method is able to diagnose cases of melanoma in 70% of cases. Mahbod et al. showed that convolutional neural networks are superior to traditional machine learning methods [17]. The authors proposed a hybrid automated computerized method for classifying skin diseases using three pre-trained

424

E. Y. Shchetinin et al.

deep networks (AlexNet, VGG16, ResNet-18) to extract the features. The features extracted in this way are then used to train the support vector machine on 150 images from the ISIC 2017 dataset. Chelebi et al. [10] proposed an ensemble of threshold methods for determining the boundaries of skin lesions. Heckler et al. [15] applied deep learning methods to classify histopathological diagnosis of melanoma and compared the result with qualified histopathologists. Esteva et al. [25] implemented a pre-trained INCEPTIONV3 network to classify nine classes, where they used a labeled set of dermatological data that has 3374 dermoscopic images, 129,450 clinical images, and reaches an accuracy of 72%. Harangi and co-authors [8] used the ensemble method DCNN (deep convolutional neural network), where they combined the result of four different architectures, improving the accuracy of melanoma classification on the 2017 ISBI dataset. XI and Bovik [26] proposed a method for segmentation of skin lesions in which the CNN model is combined with a genetic algorithm. In [2], a method for segmentation of skin lesions on dermoscopic images from the ISIC 2017 data set and their classification of various types of skin cancer using deep neural network models Mask R-CNN and U-net is proposed. The proposed method consists of preprocessing and segmentation using a hybrid learning algorithm. The goal of the first stage is to remove noise using the filtering method. In the second stage, images are segmented based on the clustering method. In [1], it was proposed to use the deep convolutional network ResNet50 for recognition of melanoma.

3

Data Description and Their Pre-processing

In clinical dermatology, there are relatively few data sets with digital images of skin lesions. Most of these sets are too small and/or not publicly available, which creates an additional barrier to research in this area. Examples of such dermatology-related image datasets are: the Dermofit image Library [23] – a dataset containing 10 different classes, including 1,300 high-quality images of skin lesions collected worldwide. Dermnet [22] – the website-enabled Atlas of skin diseases contains more than 23,000 skin images divided into 23 classes. In early 2016, the international biomedical imaging Symposium (ISBI) published a set of data for analyzing skin lesions for early detection of melanoma [4]. In order to support the training of clinical dermatologists and the development of new information technologies, the International society for skin imaging (ISIC) has developed an international repository of dermoscopic images, known as the ISIC archive. This data set contains pigmented skin lesions obtained using standard Dermoscopy. Every year, ISIC adds new images to its archive and promotes the task of implementing computer methods for detecting melanoma and other skin diseases. For example, the HAM10000 data set created within this organization served as data for the ISIC-2018 Challenge [3]. In 2019, the number of samples already numbered more than 25,000 images for Dermoscopy, available for training in 7 different categories. In Table 1 examples of images from the studied data are given. The lesion classes in the HAM10000 dataset are listed below.

Melanoma Detection Computer System Development

425

1. nv: Melanocytic nevi-benign neoplasms of melanocytes [6705 images]; 2. Mel: Melanoma-malignancy [1113 images]; 3. bkl: Benign keratosis - a common class that includes seborrheic keratosis, solar lentigo, and lichen-squamous as keratosis [1099 images]; 4. bcc: Basal cell carcinoma is a common variant of epithelial skin cancer that rarely metastasizes, but grows if untreated [514 images]; 5. akiec: Actinic keratosis and intraepithelial carcinoma are common noninvasive variants of squamous cell carcinoma [327 images]; 6. Vasc: Vascular lesions of the skin of cherry angiomas to angiokeratoma and pyogenic granulomas [142 images]; 7. Df: Dermatofibroma-a benign skin lesion [115 images].

Table 1. Image examples from ISIC archive Melanoma

4

Benign

Building a Deep Neural Network Model and Computer Experiments

In this paper, a model of the CNN deep convolutional neural network was constructed to analyze dermoscopic images and detect melanoma in them [23]. The CNN model is initialized as a sequence of layers using the Sequential class. Next, a convolutional Conv2D layer was added, with the input parameters of the feature map input shape = (32, 32, 3), where 32 is the size of the spatial features of the input map, and 3 is the number of color channels (in this case, the color of the image in RGB format). Convolution is defined by the following parameters: the size of templates extracted from input data is (3 × 3); the depth of the output feature map is the number of filters calculated by the convolution. In this model, the first convolutional layer outputs a feature map of size (30,30,32) and calculates 32 filters based on input data. Each of these 32 output channels contains a 30 × 30 value grid-a map of filter responses to input data that defines the response of this filter template for different sections of input data. The last parameter of the convolutional layer is the activation function that we use to activate neurons in the neural network, specifically ‘relu’. In the third step,

426

E. Y. Shchetinin et al.

the pooling layer (MaxPooling2D) with the map (3 × 3) was used. The main purpose of using this layer is to reduce the number of coefficients in the feature map for processing, as well as to implement spatial filter hierarchies by creating successive convolution layers for viewing larger and larger windows. Then create a vector for the fully connected flatten() layer. The flatten layer serves as a link between the data received by the network and the output vector, converting the multidimensional output of the preceding layer into a one-dimensional (vector). In the last step, a fully connected layer is built – the density layer. The density function has 2 parameters – the number of nodes for the output layer(128) and the ‘relu activation function. The output layer has 1 node where the ’sigmoid’ activation function is used. Next, you need to compile the model and optimize the weight coefficients and loss function for evaluating the model. The Adam algorithm is selected as the optimizer for our model. The loss function is binary crossentropy, since we have two classes (1 or 0: Benign (Benign) or Malignant (Melanoma) tumors). The HAM10000 data set used in this work contains 10013 images, pre-divided into 8000 training and 2000 test images. Computer experiments in research on the identification of melanoma was conducted in two stages. In the first stage, all images were placed as containing benign Benign and malignant Melanoma skin lesions. Then, training and test samples were created for each class. Due to the unbalanced classes of the studied data set, the test and training data sets were reduced by reducing the number of images in separate classes, as well as using special algorithms [22]. The quality of the constructed neural network model was evaluated using the basic Accuracy, Sensitivity, Precision and Recall metrics. Table 2 shows the confusion matrix obtained as a result of the neural network operation on the test sample. From the Table 2 we get Accuracy=91.4%, P recision = T P/(T P + F P ) = 92%, Recall = T P/(T P + F N ) = 0.91%. Similar computer experiments were performed with the architecture of convolutional networks U-net [8] and LeNet [19]. Their results are shown in Table 3. All experiments were performed using a computer equipped with a core i5 processor, 8 GB SDRAM, and an NVIDIA GeForce 920 M graphics card. Keras and TensorFlow were used to develop a neural network model and train it [4] (Fig. 1). Table 2. Confusion Matrix for proposed DCNN Matrix

Actual class Melanoma Non-Melanoma

Prediction Melanoma 69 Class Non-Melanoma 7

6 68

Melanoma Detection Computer System Development

427

Table 3. Accuracy metric values obtained by various neural network models in the test sample Neural network model Accuracy, % DCNN

91

U-net [30]

74

LeNet [14]

78.2

Fig. 1. The architecture of the deep convolutional neural network (DCNN)

At the second stage of research, computer experiments were conducted on the multiclass classification of the HAM10000 dataset described in this paper above. To solve this problem, we used models of deep neural networks, such as ResNet50, MobileNet, InceptionV3, and VGG16. The choice of these models is due to their popularity among researchers and their effectiveness in applying to the processing of complex images. In this paper, we also propose a strategy for training and fine-tuning the parameters of the ResNet34 deep neural network model, previously trained on ImageNet data [4]. For its implementation, we used the FastAI deep learning library [3], one of the most effective neural networks

428

E. Y. Shchetinin et al.

for training. The FastAI library provides strategies for improving the learning efficiency of deep neural networks based on varying the learning rate by setting different values for different parts of the network. Its feature and advantage is the use of the method of freezing network layers, when by default only the last fully connected layers are trained first. To do this, use the fit and fit one cycle algorithms. The fit method is a way to train a neural network at a constant LR learning rate, while the fit one cycle method uses the one cycle principle, where the learning rate changes over time to achieve better accuracy. After applying them sequentially, when fully connected layers are trained, you can unfreeze other layers and train the entire network. The learning rate is the most important hyperparameter for training a neural network. To find its optimal values, the learning process uses the strategies lr find and learner. The lr find method starts trial training first, starting with a low learning rate and increasing it exponentially with each batch. From the graph of the dependence of losses on the learning rate, we can choose the highest level of training, where our losses are still significantly reduced. Figure 2 shows a graph of the dependence of losses on the value of the LR learning rate during training and fine-tuning of the ResNet34 neural network built by us. Then, after the optimal LR value is found, the learner.fit one cycle procedure is performed to train the network with the obtained LR. Its results are passed to the next stage, which consists of defrosting the upper layers of the network and fine-tuning the entire network using the procedures learner.unfreeze() and learner.lr find(), as well as learner.fit one cycle.

Fig. 2. Graph of the loss dependence on the learning rate using the lr find() procedure

Melanoma Detection Computer System Development

429

Recall that the graph of the ROC curve represents the dependence of the TPR indicator on the FPR. The true positive rate of the classification (TPR) shows which percentage of objects of the positive class the algorithm predicted correctly. The false positive rate of the classifications (FPR) shows which percentage of objects of the negative class the algorithm predicted incorrectly. The area under the ROC curve AUC (Area Under Curve) is an effective characteristic of classification quality. This indicator is often used for comparative analysis of several classification models [12]. For the ResNet34 model, it was 98.4%. The AUC-ROC criterion is more resistant to unbalanced classes and can be interpreted as the probability that a randomly selected positive object will be ranked higher by the classifier (it will have a higher probability of being positive) than a randomly selected object from the negative class.

Fig. 3. Confusion matrix of the ResNet34 neural network on HAM10000

Another indicator of the performance of the neural network model is the confusion matrix. Figure 3 shows the confusion matrix for the ResNet34 model, from which the accuracy value was obtained for the test sample equal to 88.75%. Figures 4 and 5 show graphs of ROC curves, as well as AUC indicators for all classes of skin damage from HAM1000, obtained using the ResNet34 and

430

E. Y. Shchetinin et al.

Table 4. Accuracy metric values obtained by various neural network models in the test sample. Neural network model Accuracy, % ResNet-34 FastAI

88.75

InceptionV3 [21]

72.2

MobileNet

78.2

VGG16 [18]

84.3

Fig. 4. ROC curves-AUC indicators for HAM1000 dataset classes obtained using the ResNet34 network model

MobileNet models, respectively. Table 3 shows the results of applying various neural network models to classify images of skin lesions from HAM10000. It follows that the ResNet34 model is significantly more accurate than the other neural network models we have studied (Table 4). All experiments were performed using a computer equipped with an Intel Core i5 processor, 8 GB SDRAM, and an NVIDIA GeForce 920M graphics card. The estimated time spent on getting the achieved accuracy in the first case was from a few minutes to half an hour, depending on the number of epochs (from 25 to 100). In the second case, the specified accuracy required the use of the

Melanoma Detection Computer System Development

431

Fig. 5. ROC curves-AUC indicators for HAM1000 dataset classes obtained using MobileNet

Colab.Research.Google.com environment and 11 GB k80s or 14 GB Tesla T4S GPUs. The calculation time was about 11 h. Dermoscopic images alone are not sufficient for a dermatological diagnosis or for reliable remote triage of a patient in a teledermatology setting. Dermoscopic images have no context. To include it in research, you need to create an image acquisition Protocol that includes panoramic images of the entire patient’s body, as well as approximative images of each lesion, which are taken using a ruler or other reference frame visible in the image to provide contextual information about the size of the lesion. The images obtained with the ruler are also important for the patient who is already being treated to allow the accompanying doctor to monitor the development of the lesion. Both panoramic and approximation images must be performed in accordance with a protocol that ensures that the images are in focus, taken from the correct distance, and with the correct illumination. There are also details that cannot be reliably detected using the standard Dermoscopy technique currently used, and in some cases a biopsy will be required to confirm the diagnosis.

432

5

E. Y. Shchetinin et al.

Conclusion

The paper deals with the problem of classification of skin diseases and recognition of melanoma among other diagnosed skin lesions. To solve this problem, a deep convolutional neural network was implemented, which was then applied to solve the problem using the example of a generated set of digital images extracted from HAM10000 provided by the international Skin Imaging Collaboration (ISIC). The developed neural network includes various methods of image preprocessing in order to obtain more informative and balanced training and control samples. The accuracy of the model in the validation sample was 91%. Computer experiments were also conducted on the HAM10000 multiclass classification of skin diseases using a group of deep neural network models pre-trained on ImageNet and tuned to HAM10000 data. The accuracy of the ResNet34 model we configured was 88%, and the accuracy of its recognition of melanoma was 79%. It should be emphasized that the first stage of computer experiments is aimed at detecting malignant neoplasms in the studied data, which, among other things, includes melanoma. At the second stage, the task was to detect melanoma as a skin disease, which required the development and application of more complex neural networks, their rather long training, and the cost of significant computing resources. Therefore, the first approach can be used, for example, in telemedicine, as an Express method of making a preliminary diagnosis, as a signal to the patient to contact specialists for further clarification of the diagnosis. The second approach has several advantages and disadvantages. First of all, despite the focus on detecting melanoma, it is limited by computational costs. On the other hand, in the absence of the possibility of personal consultation with a professional dermatologist, obtaining a diagnosis with high accuracy based on the proposed approach remains almost the only way to solve the problem. We have shown that the use of deep neural networks is a promising approach to solving the problem of automated recognition of various dermatological diseases, including such dangerous ones as melanoma. Our further research will focus on improving the architecture of deep neural networks to improve accuracy, and exploring the possibility of using other models of deep neural networks. In addition, efforts will be made to make this model available and usable as a mobile device application in telemedicine systems. Acknowledgments. The publication has been prepared with the support of the “RUDN University Program 5–100”.

References 1. Dermnet – skin disease atlas. http://www.dermnet.com/ 2. Dermofit image library. https://licensing.eri.ed.ac.uk/i/software/dermofit-imagelibrary.html 3. Github.com. https://github.com/fastai/fastai/ 4. Imagenet database. http://www.image-net.org/

Melanoma Detection Computer System Development

433

5. Isbi’16. https://biomedicalimaging.org/2016/ 6. Isic archive. https://www.isic-archive.com/ 7. American cancer society, cancer facts and figures 2019 (2020). https://www.cancer. org 8. Codella, N.C.F., et al.: Deep learning ensembles for melanoma recognition in dermoscopy images. IBM J. Res. Dev. 61(4/5), 51–515 (2017). https://doi.org/10. 1147/jrd.2017.2708299 9. Dreiseitl, S., Ohno-Machado, L., Kittler, H., Vinterbo, S., Billhardt, H.,Binder, M.: A comparison of machine learning methods for the diagnosis of pigmented skin lesions. J. Biomed. Informat. 34(1), 28–36 (2001). https://doi.org/10.1006/jbin. 2001.1004,http://www.sciencedirect.com/science/article/pii/S1532046401910044 10. Emre Celebi, M., Wen, Q., Hwang, S., Iyatomi, H., Schaefer, G.: Lesion border detection in dermoscopy images using ensembles of thresholding methods. Skin Res. Technol. 19(1), 252–258 (2013). https://doi.org/10.1111/j.1600-0846.2012.00636.x 11. Esteva, A., Kuprel, B., Thrun, S.: Deep networks for early stage skin disease and skin cancer classification. Project Report, Stanford University (2015) 12. Fawcett, T.: An introduction to ROC analysis. Pattern Recogn. Lett. 27(8), 861– 874 (2006). https://doi.org/10.1016/j.patrec.2005.10.010 13. Gandhi, S.A., Kampp, J.: Skin cancer epidemiology, detection, and management. Med. Clin. North Am. 99(6), 1323–1335 (2015). https://doi.org/10.1016/j.mcna. 2015.06.002 14. Harangi, B.: Skin lesion classification with ensembles of deep convolutional neural networks. J. Biomed. Inform. 86, 25–32 (2018). https://doi.org/10.1016/j.jbi.2018. 08.006 15. Hekler, A., Utikal, J.S., Enk, A.H., Berking, C., Klode, J., Schadendorf, D., Jansen, P., Franklin, C., Holland-Letz, T., Krahl, D., von Kalle, C., Fr¨ ohling, S., Brinker, T.J.: Pathologist-level classification of histopathological melanoma images with deep neural networks. Eur. J. Cancer 115, 79–83 (2019). https://doi.org/10.1016/ j.ejca.2019.04.021 16. Kittler, H., Pehamberger, H., Wolff, K., Binder, M.: Diagnostic accuracy of dermoscopy. Lancet Oncol. 3(3), 159–165 (2015). https://doi.org/10.1016/S14702045(02)00679-4 17. Mahbod, A., Schaefer, G., Wang, C., Ecker, R., Ellinger, I.: Skin lesion classification using hybrid deep neural networks. In: ICASSP 2019–2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1229–1233 (2019). https://doi.org/10.1109/ICASSP.2019.8683352 18. Marks, R.: An overview of skin cancers. Cancer 75(S2), 607–612 (1995). https:// doi.org/10.1002/1097-0142(19950115)75:2+607::AID-CNCR28207514023.0.CO; 2-8 19. Nasr-Esfahani, E., et al.: Melanoma detection by analysis of clinical images using convolutional neural network. In: 2016 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), pp. 1373–1376 (2016). https://doi.org/10.1109/EMBC.2016.7590963 20. Rogers, H.W., Weinstock, M.A., Feldman, S.R., Coldiron, B.M.: Incidence estimate of nonmelanoma skin cancer (keratinocyte carcinomas) in the us population, 2012. JAMA Dermatol. 151(10), 1081–1086 (2015). https://doi.org/10.1001/ jamadermatol.2015.1187 21. Salerni, G., et al.: Meta-analysis of digital dermoscopy follow-up of melanocytic skin lesions: a study on behalf of the international dermoscopy society. J. Eur. Acad. Dermatol. Venereol. 27(7), 805–814 (2013). https://doi.org/10.1111/jdv.12032

434

E. Y. Shchetinin et al.

22. Sevastyanov, L.A., Shchetinin, E.Y.: On methods of increasing the accuracy of multiclass classification based on unbalanced data. Informat. Appl. 14(1), 67–74 (2020). https://doi.org/10.14357/19922264200109 23. Shollet, F.: Deep Learning with Python. Manning Publications Co. (2017) 24. Siegel, R.L., Miller, K.D., Jemal, A.: Cancer statistics, 2019. CA: A Cancer J. Clin. 69(1), 7–34 (2019). https://doi.org/10.3322/caac.21551, https://acsjournals. onlinelibrary.wiley.com/doi/abs/10.3322/caac.21551 25. Xie, F., Bovik, A.C.: Automatic segmentation of dermoscopy images usingself-generating neural networks seeded by genetic algorithm. Pattern Recogn. 46(3), 1012–1019 (2013).https://doi.org/10.1016/j.patcog.2012.08. 012,http://www.sciencedirect.com/science/article/pii/S0031320312003585 26. Yu, L., Chen, H., Dou, Q., Qin, J., Heng, P.A.: Automated melanoma recognition in dermoscopy images via very deep residual networks. IEEE Trans. Med. Imaging 36(4), 994–1004 (2017). https://doi.org/10.1109/TMI.2016.2642839 27. Yuan, Y., Chao, M., Lo, Y.C.: Automatic skin lesion segmentation using deep fully convolutional networks with jaccard distance. IEEE Trans. Med. Imaging 36(9), 1876–1886 (2017). https://doi.org/10.1109/tmi.2017.2695227

Distributed Systems Applications

Comparison of Different Smoothing Methods for Initial Data of the DSN-PC Sensor Network ´ am Vas1(B) and L´ Ad´ aszl´o T´oth2 1

University of Debrecen, Debrecen, Hungary [email protected] 2 SciTech M˝ uszer Kft, Debrecen, Hungary [email protected]

Abstract. Our Distributed Sensor Network for Prediction Calculations (DSN-PC) is a surface-based observational and computational network which is currently capable of calculating the change of an upper-air atmospheric parameter. The number of actually installed stations is limited thence we include data from the NOAA GFS database to create the 2D field of initial values for the prediction calculations. This hybrid application leads to numerical instability because some grid points get values from DSN-PC stations while others from NOAA GFS data. Previously we applied a smoothing algorithm based on moving average calculations. As presented in this paper, we applied two other methods. Each algorithm improved the numerical stability and prediction reliability. The type of the algorithm and the adjacency distance had a significant impact on the goodness of the forecasts. Below we compare these new results with the moving average method and the raw, unsmoothed case. Keywords: Sensor network · Distributed computing · Weather prediction · Data assimilation · Data smoothing · DSN-PC

1

Introduction

Since the 1990s, distributed sensor networks have been an actively researched and developed field. There have been a trend of moving from centralized to distributed systems consisting of cheap nodes which together are often capable of more complex tasks compared to the centralized ones. Such distributed systems are displacing the traditional systems at a significant rate [10]. A distributed sensor network is a collection of nodes that are distributed by a logical, spatial or geographical aspect and are connected to each other through wired or wireless networks. These nodes can be equipped with many types of

This work was supported by the construction EFOP-3.6.3-VEKOP-16-2017-00002. The project was co-financed by the Hungarian Government and the European Social Fund. c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 437–449, 2020. https://doi.org/10.1007/978-3-030-66242-4_34

438

´ Vas and L. T´ A. oth

sensors (temperature, wind, air pressure, sound, light, magnetic field, acceleration etc.) and always contain a central unit used for signal processing, communication control and computational tasks. With the emergence and wild availability of high-speed networks, distributed sensor networks are used extensively in aerospace industry, automation, medical imaging, geology, weather prediction etc. The purpose of interconnecting these nodes can be the improvement of the data collection speed and reliability or the coverage of wider areas where central network availability is limited. Recent technological advances have enabled the development of low-cost, low-power and multi-functional sensor devices. These are autonomous nodes with sensing, processing, and communication capabilities. Looking at a weather sensor network, the processing capabilities usually do not include mathematical computations, only signal processing and communication tasks. However, they can be used for distributed calculations of differential equation systems which generally are executed on central supercomputers of meteorological agencies. Our goal with the DSN-PC system is to build a large distributed sensor network not only for the measurement of certain atmospheric parameters but also for weather prediction calculations [20]. This way the central supercomputer can be omitted from the whole system. Previously we followed a mixed approach by integrating our own DSN-PC nodes and NOAA GFS data into a hybrid sensorand computational network [23]. After that we increased the involvement of our own measurements by directly inserting DSN-PC node measurements instead of the simultaneous interpolation [22]. This lead to problems due to significant differences (spikes) between adjacent grid points which caused numerical instability and incorrect results. This is a known issue in meteorology and several data assimilation [1,13,14] and data smoothing [11,16,25] techniques have been developed to address it. The spline methods have been the most widely used [2,5–7,15,19] and distributed algorithms have been developed based on them [17]. Their applications in atmospheric and geosciences have shown their viability [8,9,12]. Before moving to these advanced methods we tried one simpler approach based on 2-dimensional moving average calculations [22] to see whether smoothing is enough to maintain numerical stability. In this paper we compare the previous smoothing method with two others: a distributed moving median algorithm [11] and a Savitzky-Golay filter [16] - the latter not yet implemented in a distributed way thence executed in MATLAB. Below the results of the numerical weather prediction calculations are shown.

2 2.1

System and Model Description Geographical Properties

Currently our system implements a 20 × 20 size hybrid distributed sensor network which consist of 5 pieces of DSN-PC weather stations with the rest being simulated as Java threads on a server computer. This network forms a regular grid over Europe using polar stereographic projection [3]. Figure 1 shows the locations of the grid points. The detailed properties of the grid are:

Smoothing Initial Data for DSN-PC

– – – –

439

lower-left grid point coordinates: 39 ◦ N, 2.6 ◦ W upper-right grid point coordinates: 54.1371 ◦ N, 38.6715 ◦ E grid step at North Pole: 150 km central angle of the map: 0◦

Fig. 1. The regular grid of the 20 × 20 computational network (x), the locations of the NOAA GFS dataset points (·), the locations of our DSN-PC weather stations (o) and the 5 grid points whose data were replaced with the nearest DSN-PC stations’ measurements (*).

2.2

Input Data Sources and Their Assimilation

The initial values for the forecast calculations are taken from 2 sources: our 5 pieces of existing DSN-PC weather stations and publicly available data from the NOAA GFS-ANL database [4]. The DSN-PC weather stations in their present state can measure temperature, pressure and relative humidity [21]. The currently used forecast variable (500 hPa geopotential height) can be approximated based on these parameters using the hypsometric equation [23,24]. From the NOAA GFS-ANL database we downloaded and applied the 0.5◦ resolution dataset which already contains the 500 hPa geopotential height values.

440

´ Vas and L. T´ A. oth

To calculate the initial data of the 20×20 grid, as a first step, natural neighbor interpolation [18,23] was performed considering only the GFS-ANL grid points. Before the interpolation the latitude(ϕ[◦ ]) and longitude(λ[◦ ]) coordinates of the grid points and the GFS-ANL points were converted to (x,y) coordinates based on polar stereographic map projection [3]: r=

cos(ϕ) · 2a, 1 + sin(ϕ)

(1)

where 4 · 107 2π is the radius of the Earth (m). Then a=

(2)

x = r · sin(λ)

(3)

y = −r · cos(λ)

(4)

After the first step 5 grid points’ initial values were replaced by their nearest DSN-PC stations’ measurements. Table 1 shows the locations of the affected grid points and their respective DSN-PC stations. Table 1. The locations of our currently operational DSN-PC stations and the grid points whose values were replaced by DSN-PC measurements. ID ϕ[◦ N] λ[◦ E] grid point ϕ[◦ N] grid point λ[◦ E]

2.3

1

48.17 20.42 48.18

20.14

2

46.92 19.67 47.08

19.55

3

46.65 21.29 46.67

21.15

4

47.31 18.01 47.46

17.91

5

46

18.99

18.68 45.98

The Applied Numerical Weather Prediction Algorithm

In its present state the DSN-PC runs a relatively simple weather forecast model that is based on the barotropic vorticity equation originally developed by Charney, Fjørtoft, and von Neumann (CFvN) [3]. The original algorithm was refactored to a distributed form so that the nodes of the DSN-PC network are able to solve the equations in a fully distributed way [20]. In this article we cover the period between 21 March 2019 and 27 March 2019. Each day the 00:00 UTC measurements were chosen as initial values for the forecasts. We investigated the goodness of the forecasts by calculating the Mean Absolute Error (MAE):

Smoothing Initial Data for DSN-PC

1   |z500,i,j − z500,i,j |, 18 · 18 i=1 j=1 18

M AE =

441

18

(5)

where z500,i,j is the predicted and z500,i,j is the measured 500 hPa geopotential height (m) 24 h later. 2.4

Smoothing the Initial Data

During our forecast calculations numerical instability can occur. This happens because we use GFS-ANL and DSN-PC data simultaneously and GFS-ANL contains data that are already initialized, smoothed and interpolated onto a grid. However, DSN-PC measurements contain raw data. This hybrid approach leads to large differences between adjacent grid points which our simple CFvN model is not able to handle. Another reason is that it was originally designed for a larger geographical area, larger-scale atmospheric movements and larger distance between grid points. Also, DSN-PC measurements may contain measurement errors and may be affected by local weather phenomena. Trying to address this problem we previously applied a 2-dimensional moving average algorithm which could smooth those large differences between adjacent points [22]. That approach lead to satisfactory results in terms of numerical stability and the goodness of the predictions. Presented in this paper, we applied two other methods: moving median and Savitzky-Golay filter. We implemented the moving median algorithm in a distributed form. First, each node queries the initial values from its adjacent nodes over TCP/IP. Then based on the queried values they calculate the median of the whole dataset that also includes their own measurements. The adjacency distance (Np) varies between 1–3 hops. On Fig. 2 these adjacency distances are visualized on a 20×20 grid. On Fig. 3 the flowchart diagram of the moving median algorithm is shown. The Savitzky-Golay filter [16] is yet to be refactored to a distributed form which will be applicable to DSN-PC nodes. In the meantime we used MATLAB’s sgolayfilt function to calculate the filtered matrix from the raw grid data. As the function is not capable of 2-dimensional filtering, we applied two consequent steps by first going row-by-row then column-by-column: matrixOut = sgolayfilt(matrixIn’, degree, Np*2+1); matrixOut = sgolayfilt(matrixOut’, degree, Np*2+1); Np=2 and Np=3 cases were applied in the case of the Savitzky-Golay filter. The degree of the fitted polynomial varied between 2 and (2*Np)-1.

442

´ Vas and L. T´ A. oth

Fig. 2. Examples of moving median smoothing areas for different nodes with Np=1 (red), Np=2 (green) and Np=3 (blue) (Color figure online)

Fig. 3. The moving median algorithm as executed on a node at position (i,j)

Smoothing Initial Data for DSN-PC

3

443

Results

The MAE values of the forecast calculations are summarized in Table 2 and Table 3. Smoothing seems to be necessary at our current state of development to maintain numerical stability. The adjacency distance highly affects the goodness of the prediction calculations. A minimum of Np = 2 seems to be necessary in the case of moving median. The Savitzky-Golay method produced satisfactory results in both cases (Np = 2 and Np = 3). Increasing the degree of the fitted polynomial doesn’t result in significantly better forecasts in the investigated time period. An example is shown on Fig. 4 containing initial fields based on unsmoothed and smoothed values. Table 2. Mean Absolute Error (m) values of the forecast calculations performed by the CFvN algorithm on initial data smoothed using moving median method. Date

No smoothing Np = 1 Np = 2 Np = 3

21 March NaN

NaN

25.55

54.63

22 March NaN

191.65

43.44

65.23

23 March 81.19

60.83

95.01

NaN

24 March NaN

64.47

111.53

71.29

25 March 89.95

210.41

145.99

58.42

26 March NaN

194.47

76.89

100.65

27 March NaN

199.53

78.78

50.23

Table 3. Mean Absolute Error (m) values of the forecast calculations performed by the CFvN algorithm on initial data smoothed using Savitzky-Golay filter with different polynomial degrees values. Date

No smoothing Np = 2 2nd 3rd

21 March NaN

22.65

22 March NaN 23 March 81.19

Np = 3 2nd 3rd

4th

5th

48.71

20.36

34.21 48.94 56.13

45.66

44.84

46.07

44.75 44.02 44.58

64.95

70.72

65.22

61.12 72.77 73.17

24 March NaN

59.96

31.38

59.24

42.00 37.38 51.07

25 March 89.95

158.96

26 March NaN

38.85

47.39

37.05

42.39 48.53 50.03

27 March NaN

56.72

44.26

50.39

47.03 35.40 44.18

81.24 158.37 113.86 79.86 98.40

Comparing the moving average, moving median and Savitzky-Golay methods show the advantage of the Savitzky-Golay filter as it produces the smallest MAE values generally. However, this needs more review in the future by involving much more datasets as the current results containing 7 cases are not definite.

´ Vas and L. T´ A. oth

444

The initial, the analysis and the forecast height fields of the calculations using initial data from 24 March 2019 are shown based on smoothed initial data using moving average (see Fig. 5), moving median (see Fig. 7) and Savitzky-Golay (see Fig. 9) methods. The error maps of the forecasts are shown on Fig. 6, 8, 10. In these examples, for the moving average and the moving median methods adjacency distance of Np=1 was set. For the Savitzky-Golay method Np=2 was set with 3rd degree fitted polynomials.

50

54

555 0

5500

50

560

5650

5700

00 57

00 57

56

50

0

5650

5700

5500 5550 5600

00

56

5650

0 550 5550

5450

56

00 56

5550 5600

5350

5400

0

550

50

5450

5350

56

5400

0

570

5700

50

56

(a) No smoothing

5400

5350

(b) Moving average with Np=1.

50 0 0 55 5550

5400

54

5450

50

0

550

555

5500 5550 5600

0

56

00

00

56

5650

50

54

56

56

5500 5550 5600

5450

5350

50

5650

5700

5700

0

0

0 57

570

5650

0

00

570

56

50

57

(c) Moving median with Np=1.

50

56

(d) Savitzky-Golay filter with Np=2 and 3rd degree polynomials.

Fig. 4. Initial height fields using different smoothing methods performed on 24 March 2019 00:00 UTC data.

Smoothing Initial Data for DSN-PC

5300

5350

5400

00 56

56

50

5650

00 54 50 550 0 55 50

0 545 5500 50 55

00 55 50 56 00

0

0

550

5550

5600

0

50

56

5650

00 57

5700

56

50

50

54

560 56

00

56

535

54

5400

55

5700

5350

5350

00 53 50 53 400 0 5 45 5

0 550 5550

5450 5500 5550 5600

445

5650

50

5700

(a) Initial height field.

(b) Height field measured 24 hours later.

(c) Forecast height field.

175 150 125

10

50

0

75

50

50

25

25

Fig. 5. The result of the forecast based on initial data from 24 March 2019 00:00 UTC smoothed using moving average method with Np = 1.

100

75

75

75 25

75 75

50

50 25

505 2

25

75

50

50

25

25

25

25 50

25

25

25

25

25

Fig. 6. The error of the forecast based on initial data from 24 March 2019 00:00 UTC smoothed using moving average method with Np = 1.

53

0

5 55

0

0 56

0

570

56 50

56

50

50

52

50

54

50

50

55

00 56

5700

0 50 650 5300 50 55 5 5400 5450 5600 5 5700

00 55 50 56 00

54 00

5400

0 545 5500

55

00

50

5650

00 53 50 53 400 0 5 45 5

56

56

5350 53 00

5350

53

5300

50 0 0 55 5550

54

55 00

5350

5200

5400 5450 5500 5550 5600

50

´ Vas and L. T´ A. oth

446

00

56

50

00

56

56

50

57

(a) Initial height field.

(b) Height field measured 24 hours later.

(c) Forecast height field.

Fig. 7. The result of the forecast based on initial data from 24 March 2019 00:00 UTC smoothed using moving median method with Np = 1.

50

50

50 25

50

25 25

125

75

0

75

25

25

10

15200 71500 175 2550 0 27

275

175

50

25

17 200 5 150 10125 0 75 50

25

25

5 22 1251007550 25

50 75 100 150 5 12 202025205

25

100

25

50

75

75

50 0 10

50

1251150 75 5 22300 32 5

0

50

17 1505 125

10

25

25

75

75

50

50

25

25

25

Fig. 8. The error of the forecast based on initial data from 24 March 2019 00:00 UTC smoothed using moving median method with Np = 1.

Smoothing Initial Data for DSN-PC 5300 50

54

0

550

0

00 55 50 56 00

5700

55

00

56

00 56

56

50

5700

00 57

50

5600

50 56 00

00

56

50

55

55 56

5650

50 54 00 55

0

5650

5400

0 545 5500 50 55

55

00 56

56 50

00 545 54

00 53 50 53 400 0 5 45 5

555

5500 5550 5600

5350

53 50 54 00

5350

50 53

5400 5450

447

50

5650

0 570

0 65

5

(a) Initial height field.

(b) Height field measured 24 hours later.

(c) Forecast height field.

Fig. 9. The result of the forecast based on initial data from 24 March 2019 00:00 UTC smoothed using Savitzky-Golay filter with Np = 2 and 3rd degree polynomials.

25

25

25

25

75

50

50 25

25

1 15705 125 100

75

25

25

25

25

25

25

50

50

25

50

25

75

50

25

50 25

25

50 25

75

50

25

50

50

25 Fig. 10. The error of the forecast based on initial data from 24 March 2019 00:00 UTC smoothed using moving median method with Np = 2 and 3rd degree polynomials.

448

4

´ Vas and L. T´ A. oth

Conclusion

During our efforts for creating a highly autonomous weather prediction network we succeeded in moving one important step forward as now we are able to utilize DSN-PC station measurements as data sources for a weather prediction model by applying fully distributed smoothing algorithms to the nodes. Although the spatial coverage of our current network is not optimal as of now, involving public databases like NOAA GFS-ANL has proven to be a viable solution to address that problem. Since our measurements are not initialized and assimilated together with the GFS-ANL data it was necessary to apply 2-dimensional data smoothing methods to get reasonable results with the CFvN algorithm. Applying three different methods show the advantage of the Savitzky-Golay filter in terms of prediction reliability but its computational needs are the highest. Further investigation and comparison of these methods seems to be necessary to draw a general conclusion. Also, it’s worth investigating whether there are some particularities in the certain initial fields that make one smoothing method more useful than the others. Acknowledgements. We wish to thank Ficsor Endre, Perlaki Csaba, Szab´ o S´ andor, Vas Ferenc and the Baptist Church of Kecskem´et for providing place for our DSN-PC weather stations and thus supporting our research. We also thank SciTech M˝ uszer Kft. for providing the possibility to use their facilities and for supporting our work financially; and G´ abor Nagy for his contribution in designing, manufacturing and testing our weather stations’ electronic circuits.

References 1. Andersson, E., Th´epaut, J.-N.: Assimilation of Operational Data. In: Lahoz, W., Khattatov, B., Menard, R. (eds.) Data Assimilation, pp. 283–299. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-540-74703-1 11 2. Baramidze, V., Lai, M.J., Shum, C.K.: Spherical splines for data interpolation and fitting. SIAM J. Sci. Comput. 28(1), 241–259 (2006) 3. Charney, J.G., Fjørtoft, R., Neumann, J.V.: Numerical integration of the barotropic vorticity equation. Tellus 2(4), 237–254 (1950) 4. for Environmental Prediction, N.C.: Global Forecast System (GFS) — National Centers for Environmental Information (NCEI) formerly known as National Climatic Data Center (NCDC). https://www.ncdc.noaa.gov/data-access/modeldata/model-datasets/global-forcast-system-gfs 5. Freeden, W., T¨ ornig, W.: On spherical spline interpolation and approximation. Math. Methods Appl. Sci. 3(1), 551–575 (1981) 6. Freeden, W., Nashed, M.Z., Schreiner, M.: Spherical Harmonics Interpolatory Sampling. In: Spherical Sampling, pp. 267–300. Birkh¨ auser Basel (2018) 7. Freeden, W., Schreiner, M.: Special functions in mathematical geosciences: an attempt at a categorization. In: Handbook of Geomathematics, pp. 2455–2482. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-642-01546-5 31 8. Hutchinson, M.F.: Interpolation of rainfall data with thin plate smoothing splines -part II: analysis of topographic dependence. J. Geographic Inf. Decis. Anal. 2(2), 152–167 (1998)

Smoothing Initial Data for DSN-PC

449

9. Hutchinson, M.F.: Interpolation of rainfall data with thin plate smoothing splines. Part I: Two dimensional smoothing of data with short range correlation. J. Geographic Inf. Decis. Anal. 2(2), 139–151 (1998) 10. Iyengar, S.S., Brooks, R.R.: Distributed Sensor Networks : Sensor Networkingand Applications (Volume 2). Chapman and Hall/CRC, Boca Raton (2016) 11. Justusson, B.I.: Median Filtering: Statistical Properties. In: Two-Dimensional Digital Signal Prcessing II, pp. 161–196. Springer, Heidelberg (1981). https://doi.org/ 10.1007/BFb0057597 12. Kiani, M.: Template-based smoothing functions for data smoothing in Geodesy. Geodesy Geodyn. 11(4), 300–306 (2020) 13. Lahoz, W., Khattatov, B., M´enard, R.: Data assimilation and information. In: Lahoz, W., Khattatov, B., Menard, R. (eds.) Data Assimilation, pp. 3–12. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-540-74703-1 1 14. Lynch, P., Huang, X.-Y.: Initialization. In: Lahoz, W., Khattatov, B., Menard, R. (eds.) Data Assimilation, pp. 241–260. Springer, Heidelberg (2010). https://doi. org/10.1007/978-3-540-74703-1 9 15. S., L.L., Wahba, G.: Spline Models for Observational Data. Mathematics of Computation 57(195), 444 (jul 1991) 16. Savitzky, A., Golay, M.J.E.: Smoothing and differentiation of data by simplified least squares procedures. Anal. Chem. 36(8), 1627–1639 (1964) 17. Shang, Z., Cheng, G.: Computational limits of a distributed algorithm for smoothing spline. J. Mach. Learn. Res. 18(108), 1–37 (2017) 18. Sibson, R.: A Brief Description of Natural Neighbour Interpolation. In: Interpreting multivariate data, pp. 21–36. Wiley, Hoboken (1981) 19. Van Assche, W., Freeden, W., Gervens, T., Schreiner, M.: Constructive approximation on the sphere, with application to geomathematics. J. Approximation Theory 112(2), 324–325 (2001) ´ Fazekas, A., ´ Nagy, G., T´ 20. Vas, A., oth, L.: Distributed sensor network for meteorological observations and numerical weather prediction calculations. Carpathian J. Electr. Comput. Eng. 6(1), 56–63 (2013) ´ Nagy, G., T´ 21. Vas, A., oth, L.: Networkable sensor station for DSN-PC system. Carpathian J. Electr. Comput. Eng. 8(2), 37–40 (2015) ´ Owino, O.J., T´ 22. Vas, A., oth, L.: Improving the simultaneous application of the DSN-PC and noaa GFS datasets. Annales Mathematicae et Informaticae 51, 77– 87 (2020) ´ T´ 23. Vas, A., oth, L.: Investigation of a hybrid sensor- and computational network for numerical weather prediction calculations. In: Vishnevskiy, V.M., Samouylov, K.E., Kozyrev, D.V. (eds.) DCCN 2019. CCIS, vol. 1141, pp. 510–523. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-36625-4 41 24. Wallace, J.M., Hobbs, P.V.: Atmospheric Thermodynamics. In: Atmospheric Science, pp. 63–111. Elsevier (2006) 25. Woodford, C.H.: An algorithm for data smoothing using spline functions. BIT 10(4), 501–510 (1970)

NFC Vulnerabilities Investigation S. Japertas1(B) and R. Jank¯ unien˙e2(B) 1

Kaunas University of Technology, K. Donelaiˇcio St. 73, 44249 Kaunas, Lithuania [email protected] 2 University of Applied Engineering Sciences, Tvirtov˙es av. 35, 50155 Kaunas, Lithuania [email protected] https://www.ktu.edu/, http://www.ktk.lt/

Abstract. The evolving Internet of Things is based on such short-range technologies as Bluetooth, RFID, etc. However, one of the biggest drawbacks of these technologies is their vulnerabilities. This paper addresses the vulnerabilities of NFC technology which belong to the RFID class, namely, signal interception and jamming. Near Field Communication (NFC) defines a short-range wireless standard allowing data to be transmitted between two devices at a maximum distance of 20 cm (usually, 4 cm). NFC technology is widely used including banking and access control. Therefore, loss of data or jammed data on an NFC chip may result in a variety of extremely negative consequences for the users of this technology. The signal produced by the NFC scanner and tag is analyzed in this research. The maximum distance is investigated at which it is possible to record a signal of 13.56 MHz. Experiments show that data can be intercepted at a distance of up to 10 m by using an improvised passive antenna without any amplification or signal filtering circuits and by employing publicly available spectrum analyzers. Jamming of the signal was performed with a specially designed generator and another NFC reader. NFC signal attenuation results indicate that an attenuator with a very precise frequency is required. When another NFC scanner is used as the damper, the maximum distance at which the transmission between the scanner and the tag is successfully jammed is about 9 cm.

Keywords: Near field communications interception

1

· Jamming · Signal

Introduction

The use of Near Field Communication (NFC) technology is expanding. It is used in bank payment cards, identity documents, as well as in access control and mobile phones. A major challenge, however, is the security gaps in the employed technology. These security disadvantages are multi-layered and multifunctional.

c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 450–463, 2020. https://doi.org/10.1007/978-3-030-66242-4_35

NFC Vulnerabilities Investigation

1.1

451

RFID Technologies

NFC belongs to the group of RFID technologies, but uses different frequencies (operates at 13.56 MHz) and is significantly more popular than other RFID technologies [1]. Radio Frequency Identification (RFID) is a system which transmits object identification by using radio waves. One of the simplest RFID systems consists of the following components: an RFID tag that stores information, a scanner (reader) receives information from an RFID tag and transmits it for further processing, a transmitter generates radio signals, and an antenna transmits a radio signal between the scanner and the RFID tag. NFC technology is similar to other RFID technologies, because it consists of two devices featuring antennas, which are used to exchange information due to electromagnetic induction (not by radio waves). Information is usually transmitted over short distances, stored on chips and transmitted to the end-user. In general, three main RFID technologies are distinguished: low-frequency, highfrequency, and ultra-high-frequency technologies. Low frequency RFID technology operates at 125 kHz and 134 kHz. The specificity of such technologies is that they are typically used with no additional cryptographic protection. Such technologies are needed when rapid access to the information stored on microchips is required, but strong protection of such information is not necessary. For example, such a RFID technology is used to tag animals. High frequency technology is NFC. It is the most popular RFID technology and it operates at 13.56 MHz. As was mentioned above, with the help of this technology, various operations are performed that require a sufficiently high level of security. Therefore, such technologies feature additional cryptographic protection. NFC works when NFC devices touch each other so that to establish connection between the devices. The NFC system consists of two modes: active and passive devices. The difference between NFC and other RFID technologies is that other RFID technologies can only work when one device is active and the other is passive. Most UHF RFID systems operate between 860–960 MHz bands. However, there are UHF RFID systems operating at 433 MHz and 2.45 GHz. A distinctive feature of the UHF RFID technology is that it does not communicate through magnetic coupling but instead uses passive backscatter modulation according to ISO-18000-6C Standard [2]. The information contained in these tags can be scanned over relatively long distances. Therefore, such passive UHF RFID systems are used in hundreds of various applications, such as tool tracking, IT asset tracking, race timing, and so on. However, such systems have the advantage that UHF RFID information, as mentioned above, can be scanned over long distances. At the same time, this advantage becomes the biggest disadvantage of UHF RFID. That is, since a UHF RFID reader can emit a signal of up to 2 W, it is not a complex problem to receive such a signal [3]. Therefore, this variation of RFID technology is also used relatively less frequently than NFC.

452

S. Japertas and R. Jank¯ unien˙e

NFC Operation Modes. According to NFC Forum [1], NFC can communicate either in two-way communication, or in peer-to-peer communication. NFC devices are unique in that they can change their operating mode depending on the situation. A total of three NFC operating modes are distinguished: Peer-toPeer (P2P), Reade rWriter, and Card Emulation. Peer-to-Peer Mode. This mode allows two NFC devices to communicate with each other, exchange information and share files, i.e., both devices work as active devices. Reader Writer Mode: A device that supports NFC (the active device) can read the information stored in the NFC tag (the passive device). Such tags can be placed in various locations, such as smart posters, advertisements, and so on. The user can read the tag information stored on the passive device chip for further use. Card Emulation Mode. This mode allows the NFC device to act as a smart card: to perform transactions such as shopping, ticketing and controlling access to public transportation. 1.2

NFC Technology Vulnerabilities

Although NFC is a fairly mature technology, there is a significant likelihood of encountering various attacks which could affect NFC because of the free space data channel. Interception of the communication channel by a third party which uses or modifies the captured data for its own purposes is possible without knowing that this third party is intervening (man-in-the-middle attack) Fig. 1. Especially difficult to detect such an attack on an NFC channel when communicating in the peer-to-peer mode and when the two mobile devices are communicating actively.

Fig. 1. Man-in-the-middle pattern. Left: Attacker captures data sended by transponder to reader. Right: Attacker is participating in both sides of the communication.

Table 1 reveals information about some other threats, such as Eavesdropping, Ticket Cloning, Use Only Single ID, Spoofing, Phishing, Tag Tampering, Relay Attack, Data Corruption, Data Modification, Data Insertion, and Denial of Service (DOS) [4]. Such threats occur in touch-and-go NFC applications, particularly when the user needs to touch the NFC device to the NFC reader [4].

NFC Vulnerabilities Investigation

453

Table 1. Threats in NFC

Threats

Description

Eavesdropping

Signal scanning is possible up to 1 meter for passive signals and up to 10 m for active signals. Active signals are much stronger. It is hard to prevent eavesdropping because signals have to be received reliably by the receiver and to be strong enough. There is no need for the attacker to receive all messages; it is commonly sufficient to get some of them. Attacker can use big and complex antennas, and logistics in the receiver terminal is commonly used; thus, the size of antennas and the level of performance can be restricted. This is relevant for the card emulation and peer-to-peer modes

Ticket Cloning

The purpose is to share data with the ticket until its expiry (in the e-ticket system). This is manifested if the tickets were copied and transferred to others before checking. Everybody can use such a ticket as a new one. If the cloned ticket has already been checked, it can be used until its expiry date

Use Only Single ID

Every contactless smart card chip has a unique ID for non-collision wireless reading, and this ID is used for identification. There is neither encryption nor authentication to read an ID with an NFC reader. An attacker can hijack or copy a unique ID

Spoofing

Tag content is counterfeited by providing false information, such as a fake domain name, a false URL, or an email. Smart poster URI spoofing allows attacks on the web browser, URLs and mobile services by using SMS URI, telephony URI, etc.

Phishing

Phishing in NFC is possible with social engineering. Disclosing personal information is directed to malware

Tag Tampering

Attackers use passive tags to create an attack vector. The most common way is to simply destroy the original passive tag or to block the connection to it, and then replace it with a malicious tag

Relay Attack

These attacks are impossible to recognize both with a card and with a reader. This attack is performed by using Application Protocol Data Unit (APDU) commands. Malicious apps can get APDU commands from the network socket. The main relay attack system uses two devices: ghost or leech. A ghost is a device which fakes a card for the reader; meanwhile, a leech is a device which fakes the reader’s card. Bidirectional connection is created between the ghost and the leech by using a transparent communication channel through the reader and the tag

Data Corruption

If the attacker has modified the NFC interface, the data may be corrupted. This leads to denial of service because the attacker has changed data to an unrecognized format, and this causes disruption of communication between the user and the receiver. If the data in the NFC tag is corrupted, the tag will be useless, and the device must recover the data again. Data corruption can be done by malicious software running on a smartphone

Data modification

Data may be changed to incorrect values when the data is being transmitted between NFC devices. This type of vulnerability requires the attacker’s experience in the wireless and radio technologies because transmission amplitude modulation needs to be processed

Data Insertionk

An attacker in the form of messages can insert any unwanted data, especially during the exchange of data between NFC devices. The attacker must respond to the device before the legitimate device makes a connection. The obtained data would be corrupted if both legitimate devices and impersonators transmit data at the same time

Denial of Service (DOS)

A DOS attack occurs when the request for access to a NFC security chip or malicious mobile phone application continues. The access to the security chip will also be locked until the attack stops sending mass requests and therefore may lose its function. The entire application process will be terminated. Additionally, DOS can occur when the NFC scanner is touched with an empty tag. Error messages that may affect NFC devices or services may then be stopped

454

S. Japertas and R. Jank¯ unien˙e

The vulnerability described in Table 1 is only possible if malware acts remotely. However, there are only a few works dealing with the investigation of the distance of NFC signal propagation. According to the NFC Forum, such a small amount of researches in this area stems from the fact that the NFC signal usually travels only a short distance (< 20 cm) which is physically controlled [1]. Therefore, it is argued that real signal interception is practically impossible and that NFC technology is safe [4]. However, NFC can have EM fields above this range that would definitely be vulnerable for a potential attack, especially when devices are performing in the active mode. Thus, the NFC signal can be intercepted at distances greater than 20 cm, i.e., there are no major problems in capturing the signal at these distances with a scanner [5–13]. Paper [5] observes that physical attacks on NFC technology such as remove, shield, clone, and high distance read are possible, but the details were not revealed. Some works described NFC security systems regarding prevention of man-inthe-middle and relay attacks [6,7]. The authors [6] provided an example how criminals can intercept important data (in this particular case, information stored in a citizen’s passport) using this technology. Two different signals are necessary to achieve successful data transfer: the first when the scanner sends a signal to the NFC tag, and the second when the NFC tag sends a response to the scanner [6]. The signals were captured at a distance of one meter by using the following equipment: an H-field antenna, a radio frequency receiver, an oscilloscope, and a computer (for storing the intercepted data). The security of NFC payments is analyzed in [7]. The authors propose a method to attack mobile-based NFC payment methods by making a wormhole through which a payment could be made with the card physically being in a different location. As it was shown in [8], it is possible to receive the signal at a distance of up to 30 cm and demodulate the command by using a tag passive antenna. Paper [9] states that the NFC passive element signal can be intercepted at short distances, while the active element signal can be intercepted at distances of up to 10 m. However, this work does not provide any evidence or references to other papers. Therefore, it is not clear under what conditions such signal interception is actually possible. It is possible to receive the signal at a distance of up to 100 cm when making near-field contactless payments [10]. However, such experiments were performed with HF RFID technology only. Another research states that the NFC signal can be transmitted at a distance of several meters from the reader [11]. Hence, this signal can be picked up at the same distance. However, again, there are only statements without clear experimental results or references to other works.

NFC Vulnerabilities Investigation

455

All the weaknesses inherent in radio communication are essentially inherent in NFC technology as well, including signal jamming. Paper [12] experimentally showed that the presence of NFC transponders can be determined at a distance of up to the 2.5 m. Paper [12] also states that it would be useful to investigate NFC technology jamming separately for the reader and the tag. Reflective and pulse jamming can be used for attacks on NFC technologies. In order to avoid such physical effects, the authors suggest using the EnGarde solution. However, this paper does not reveal how NFC technology is actually jammable. Paper [13] strives to analyze jamming during a cyber-attack session. Signals at 13.56 MHz, correctly chosen for the NFC transmitter, can jam an NFC signal very easily [14,15]. However, such attacks are very rare due to their low effectiveness. Keeping in mind the information listed above, it is evident that studies on NFC signal interception are incomplete. Therefore, the question of the real possibilities of intercepting the NFC signal still remains open. Despite all the strengths of NFC technology regarding such security threats as data pre-encoding, synchronization between devices before communication and short distance for data transmission (from 4 to 20 cm), there are some NHC threats that need to be kept in mind. The most common vulnerabilities are data modification, eavesdropping (or interception), man-in-the-middle attack, and data corruption. The latter one is more vulnerable for an attack at a data rate of 106 Kbps. In order to overcome this issue, it makes sense to have more power at the NFC receiver. This is because the attacker’s transmitters always use more power compared to NFC transmission (equalling to about 10 to 20 dBm). NFC is particularly vulnerable for an attack when the devices are performing in the active mode because RF fields are stronger in the active mode. The activepassive mode for communication is harder to overcome by eavesdropping. The use of a secure channel for communication is another alternative. This provides protection against eavesdropping and data modification attacks. For example, Diffie-Hellman as the key agreement protocol because of its inherent protection is the proper decision against the man-in-the-middle attack [16]. The shared key can be used to derive a symmetric key for the NFC secure channel, which assures confidentiality, integrity and authenticity of the data transferred between the involved devices.

2

Methodology of Experiments

Two vulnerabilities of the NFC technology are of interest: NFC signal interception distance and scanner suppression. Reader. ACR122U NFC Reader. This device is compliant with ISO/ IEC18092 R ISO 14443 A and B cards but also Standard. It supports not only MIFARE and all the four types of NFC tags. The operating distance of ACR122U is up to 5 cm depending on the type of the tag in use. Readers ACR1222L, ACR128U and NFC integrated to Nexus 7 Tablet were investigated in the jamming investigations.

456

S. Japertas and R. Jank¯ unien˙e

Tag. A plastic card with an integrated NFC tag based on a Mifare 4k chip. Equipment Used for Measurement. This device is capable of measuring the characteristics of signals from 9 kHz to 8 GHz. It also allows performing many other functions; the one that is relevant in this study is the averaging function. Jammer. A special attenuator operating at 13.56 MHz was designed and manufactured to investigate the possibilities of NFC signal attenuation. For the most accurate frequency of 13.56 MHz, the quartz generator scheme was chosen. 13.56 MHz signal was amplified with an amplifier based on IRFP450 transistors and 1.7 nH, 570 nH, and 88 nH inductors (the latter were specially designed for this research). The power at the output of such an amplifier is 4 W. Measurement Errors. Three measurements were made at each point in order to determine possible measurement errors. The obtained results were averaged, and these means were used in graphs and mathematical models. As a result, the following relative error δ (1), variance D (2), and standard deviation RMS (3) values were determined:    xi − μ   · 100%;  (1) δ= xi  n (xi − μ) D= 1 ; (2) n−1   n 1  RM S =  x2 ; (3) n 1 1 where, xi is the measured value, μ is the average, and n is the number of measurements. The error estimate showed that the maximum relative error was δ < 5%; maximum variance was D < 7 dBm, and the maximum measurement deviation from the RMS was < 5%. Figure 2 reveals the signal variation of the produced 13.56 MHz jammer depending on the polarization of the antenna in the closed space (corridor) and the calculated signal variation in the free space. The study was performed by fixing the specially manufactured 13.56 MHz frequency generator, and signal measurements were performed at every 1 m further away from the generator. The results were approximated with the logarithmic formula (4): PR x = −14.6d + 14.6lg(f ) − 85.25;

(4)

where d is the distance between the transmitter and the receiver, m; f is the frequency, MHz. These results are plotted in Fig. 2 as Model.

NFC Vulnerabilities Investigation

457

Fig. 2. Variation of jammer signal with distance.

One can see that the signal strength slightly increases between about 6 and 9 m from the location of the transmitter. This could be explained by the waveguide effect in the case of higher frequencies. However, in this case, if it is the waveguide effect, it occurs significantly earlier than in the case of higher frequencies, although the measurements were made under identical conditions of construction and geometry of the premises [17]. Antenna. The first experiments were performed with a 20 cm long omnidirectional antenna. However, with the help of such an antenna it was possible to receive the signal at a distance of 1.5 m only from the reader. Therefore, a 1.7 m long omnidirectional antenna was used for further experiments. Measurements. It was assumed that equipment selection and/or its manufacturing could be sufficiently freely available to the attacker. In this case, the NFC signal strength was measured only to the level of −85 dBm. Therefore, the experimental distance between the NFC reader and the spectrum analyzer was increased until the signal level of −85 dBm was reached. Two scenarios were used to study the propagation distance of the NFC signal: when the reader was operating in the passive mode, i.e., no tag was being used, and when the tag was covering the reader. The latter one was placed 1 m above the floor. A 1.7 m long antenna was connected to a spectrum analyzer. Measurements were made by varying the distance between the instrument and the spectrum analyzer at every one meter. The radiation of the reader signal was measured at various positions of the reader antenna relative to the receiver antenna Fig. 3.

458

S. Japertas and R. Jank¯ unien˙e

Fig. 3. ACR122U NFC Reader’s positional orientation to the antenna of the spectrum analyzer. The positions of the spectrum analyzer antenna are numbered.

3 3.1

Results NFC Signal Interception Investigation

Scenarios 1 (Reader’s passive mode). During the experiments, the signal strength of the reader was measured in the standby (passive) mode of the reader. The signal strength was recorded from all the sides of the reader. The results are shown in Fig. 4.

Fig. 4. Changes of the reader signal level vs distance when the reader is in the passive mode.

NFC Vulnerabilities Investigation

459

The results show that the maximum distance radiated by the signal is observed when the scanner is positioned and measured from the left, right, or by turning to the right at an angle of 45◦ . It is obvious that there are some orientations of such an antenna for the optimal position of signal reception. In all other cases, with the increasing distance, the signal strength decreases sharply, and it is difficult to detect it at 5 m (when the scanner is on the plane from the back). The maximum radiating distance of the scanner was recorded at up to 11 m away. It can be observed that the variation of these signals follows the linear law y = ax + b, and slope coefficient a of these lines (which describes the physics of wave propagation) is approximately the same. Coefficient b depends on the orientation angle of the antennas. Although, as shown above, the variation of 13.56 MHz signal is close to the logarithmic scale, it is still convenient to summarize the obtained results by linear relationship Eq. (5): PR x = −2.715 · d + b

(5)

where PRx is the signal level at the receiver, dBm; d is the distance between the transmitter and the receiver, m; b is a free member which depends on the orientation angle of the transmitter and the receiver antennas. Scenarios 2 (with the Reader Being in the Active Mode). This scenario investigated the variation of the NFC signal level by increasing the distance between the reader and the receiver (spectrum analyzer) during tag scanning, i.e., when the tag covers the scanner. The tag ID number was scanned. The tag ID was provided by the manufacturers provided the tag ID and it was fixed. The signal strength was recorded from all the sides of the reader. The results are shown in Fig. 5.

Fig. 5. Changes of the reader signal level vs distance (the reader is in the active mode).

460

S. Japertas and R. Jank¯ unien˙e

One can observe that the variation of these signals, as in the previous case Fig. 4, follows the linear law y = ax + b, and slope coefficient a of these lines (which describes the physics of wave propagation) is approximately the same. Therefore, these results can be reflected with the same relation Eq. (5). By summarizing Figs. 4 and 5, the following regularities of NFC signal changes can be observed: • By looking at the signal strength of the reader in different directions of orientation of the transmitter antenna towards the receiver antenna, we see that the signal strength decreases linearly rather than logarithmically with varying distances (as in the case of UHF frequency ranges). The shortest distance between the transmitter and the receiver was fixed when the reader was placed on a plane from the back. However, in this case, the signal strength was recorded even at a distance of up to 4 m from the transmitter. • Coefficient b depends on the angle between the antennas of the reader and the receiver, i.e., from the angle between axis 2–4 Fig. 3 and the location of the receiver Fig. 6.

Fig. 6. Dependence of coefficient b on the angle between the transmitter and the receiver antennas.

It should be noted Fig. 6 that coefficient b approximates formula (6) values well with some error: b = 12.90|sin(α)| − 66.33;

(6)

NFC Vulnerabilities Investigation

461

where α is the angle between the transmitter and the receiver antennas. When inserting this expression into formula (5), it yields: PR x = −2.715d + 12.90|sin(α)| − 66.33;

(7)

However, this is not a very accurate approximation as the purpose of this work was not to determine the regularities of signal changes, but rather to evaluate certain safety considerations. 3.2

NFC Signal Jamming Investigation

Firstly, the signal strengths of the readers and the jammer were determined at a distance of about 4 cm between them. The results (presented in Table 2) reveal the attenuation of the signals of all the three readers’ dependency on the attenuator’s signal strength. Table 2. Signal strengths of the readers and the jammer at a distance of about 4 cm from them. Passive mode Reader

Signal strength, dBm

ACR1222L

−77.72

Nexus 7 tablet −81.55 ACR128U

−68.98

Jammer

−35.1

The signal strength of the NFC reader increases during tag scanning (the tag is placed on the reader). Therefore, this needs to be evaluated (Table 3). Table 3. Signal strengths of the readers in the active mode at a distance of about 4 cm from them. Active mode Reader

Signal strength, dBm

ACR1222L

−46.03

Nexus 7 tablet −48.56 ACR128U

−45.84

Although it would seem that the attenuator must suppress the NFC signal, the effect of the attenuator was minimal in the real experiment, and the signal emitted by the scanner was not actually affected. Accurate measurements of the attenuator frequency revealed that the attenuator frequency differed by

462

S. Japertas and R. Jank¯ unien˙e

6 kHz from the NFC scanner frequency. When the attenuator frequency was tuned exactly to the NFC scanner frequency, the NFC readers’ signals were successfully suppressed, i.e., the data was not read from the card when the card was being laid on the reader. An attempt was made to read the NFC tag ID number during the investigation. However, the distances at which the silencer operated effectively were short (Table 4). For the jamming of the NFC tag in this case, the jammer had to be close enough to the reader: from 5.5 to 9 cm away. Table 4. Maximum distance jammer from the reader for successful tag jamming. Jamming of NFC tag Reader

Distance, cm

ACR1222L

5.5

Nexus 7 tablet 6.5 ACR128U

9.5

By using various types of tags, the reader was also jammed at the same distances. It was obvious that the jammer acted directly on the reader, but not on the tag.

4

Conclusions

Analysis of literature shows that there has been little work done for the investigation of real jamming of NFC technology, i.e., insufficient attention has previously been paid to this issue although the consequences would be particularly grave if successful jamming were achieved. Our investigation has shown that the tag signal of the NFC reader can be intercepted at a significantly longer distance than officially announced – it was actually greater than 10 m. It should be noted that the experiments were performed until the signal level dropped below −85 dBm. The outcomes of such experiments revealed the possibility to jam the signal with a jammer. The jammer used in this investigation can jam the NFC reader’s signal at a distance of 9.5 cm between the scanner and the attenuator, depending on the type of the scanner. For the jamming of the signal, it is necessary to generate an electromagnetic wave of exactly the same frequency as that of the NFC reader. A small deviation (6 kHz in our case) from this frequency does not allow jamming the NFC signal anymore. The proposed models evaluate the regularity of 13.56 MHz signal strength variation in small indoor distances as well as the dependence of 13.56 MHz signal variation on the angle between the transmitter and the receiver. The accuracy of the latter model is not high. However, this research did not set the objective of establishing strict regularities.

NFC Vulnerabilities Investigation

463

The research of this problem will likely take place in two directions in the future: investigation of the regularities of 13.56 MHz signal propagation over short distances under various environmental conditions as well as the structure of the intercepted NFC signal regarding the feasibility of detecting such a signal.

References 1. NFC forum. https://nfc-forum.org/. Accessed 20 Sep 2020 2. Farsens. http://www.farsens.com/en/2016/03/31/how-backscattering-affects-readrange-in-uhf-rfid-systems/. Accessed 20 Sep 2020 3. Garcia-Alfaro, J., Herrera-Joancomart´ı, J., Meli` a-Segu´ı, J.: Security and privacy concerns about the RFID layer of EPC gen2 networks. In: Navarro-Arribas, G., Torra, V. (eds.) Advanced Research in Data Privacy. SCI, vol. 567, pp. 303–324. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-09885-2 17 4. Singh, M.M., Adzman, K.A.A.K., Hassan, R.: Near field communication (NFC) technology security vulnerabilities and countermeasures. Int. J. Eng. Technol. 7, 298–305 (2018) 5. Masyuk, M.A.: Information security of RFID and NFC technologies. In: Journal of Physics: Conference Series, vol. 1399, pp. 1–6 (2019) 6. Kavya, S., Pavithra, K., Rajaram, S., Vahini, M., Harini, N.: Vulnerability analysis and security system for NFC-enabled mobile phones. Int. J. Sci. Technol. Res. 3(6), 207–210 (2014) 7. Giese, D., Liu, K., Sun, M., Syed, T., Zhang, L.: Security analysis of Near Field Communication (NFC) payments, arXiv preprint (2019) 8. Kortvedt, H. S., Mjølsnes, S. F.: Eavesdropping near field communication. In: The Norwegian Information Security Conference (NISK), pp. 57–68 (2019) 9. Jin, R., Zeng, K.: Secure inductive-coupled near field communication at physical layer. IEEE Trans. Inf. Forensics Secur. 13(12), 3078–3093 (2018) 10. Diakos, T.P., Briffa, J.A., Brown, T.W.C., Wesemeyer, S.: Eavesdropping near-field contactless payments: a quantitative analysis. J. Eng. 7, 1–7 (2013) 11. Near Field Communications and mobile threats (2015). https://fedvte.usalearning.gov/courses/MSDS2015/course/videos/pdf/ MS 2015 D01 S07 T01 STEP.pdf 12. Gummeson J., Priyantha B., Ganesan D., Thrasher D., Zhang P. EnGarde: protecting the mobile phone from malicious NFC interactions.In: proceeding of the 11th Annual International Conference on Mobile Systems, Applications and Services, pp. 445–458. Association for Computing Machinery (2013). https://doi.org/ 10.1145/2462456.2464455 13. Oh S., Doo T., Ko T., Kwak J., Hong M.: Countermeasure of NFC relay attack with jamming. In: 12TH International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT), pp. 1–4. IEEE (2015). https://doi.org/10.1109/ CEWIT.2015.7338165 14. Ramos, A., Scott, W., Scott, W., Lloyd, D., O’Leary, K.: A threat analysis of RFID passports. Queue 7(9), 1–5 (2009) 15. Nelson, D., Qiao, M., Carpenter, A.: Security of the near field communication protocol: an overview. J. Comput. Sci. Coll. 29(2), 94–104 (2013) 16. Biswas, B., Basuli, K., Sen, S.S.: On a key exchange technique, avoiding man-inthe-middle attack. J. Glob. Res. Comput. Sci. 3(9), 28–30 (2012) 17. Japertas, S., Orzekauskas, E., Slanys, R.: Investigation of Wi-Fi indoor signals under LOS and NLOS conditions. Int. J. Digit. Inf. Wire. Commun. (IJDIWC) 2(1), 26–32 (2012)

Data Migration Rate of CRUSH-Based Distributed Object Storage with Dynamic Topology Alexey Vanin1,2(B) , Vladimir Bogatyrev3 , and Stanislav Bogatyrev2 2

1 ITMO University, Saint Petersburg, Russia NEO Saint Petersburg Competence Center, Saint Petersburg, Russia {alexey,stanislav}@nspcc.ru 3 Saint Petersburg State University of Aerospace Instrumentation, Saint Petersburg, Russia

Abstract. Distributed systems are widely used to solve problems that require large computational or storage resources. The scalability of such systems makes them cheaper. However, the overhead for maintaining the system’s performance or operation ability may be significant. This paper considers a distributed P2P storage system in uncontrolled dynamic environment. The change of the structure or the topology in such system can lead to data migration that may consequently cause system overload. This paper examines the intensity and the amount of these migrations for different CRUSH-based data placement approaches. Keywords: Distributed system · Storage system · Simulation modeling · Data migration · CRUSH · DHT · P2P

1

Introduction

The amount of generated and stored data is increasing every year [9]. This allows to develop new big data processing algorithms and train accurate neural networks. These research areas continue to improve because there is a place where all this big data can be stored. Due to technical limitations and economic reasons, storage systems virtualize their resources in hardware level: hard disks or magnetic tapes combined in clusters; as well as at operation level when data is spread across several storage nodes. These storage nodes may be geographically distributed [8,11] to increase reliability [4]. Data should be securely stored and accessible to a variety of agents that interact with it. Such agents are databases, web applications, raw data parsers, neural networks, etc. In order to unify interaction, modern storage systems store data in the form of objects. These objects contain data as a payload and provide additional meta-information, some context to it. Amazon S3 object storage interface has become a de facto standard for clients working with such data. Other cloud storage providers [2] implement this interface to be competitive on the market. c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 464–471, 2020. https://doi.org/10.1007/978-3-030-66242-4_36

Data Migration Rate of the CRUSH-Based Distributes Storage

465

This paper considers a distributed object storage system as a set of storage peers. This approach allows to develop cheap, horizontally scaling P2P systems [7,10]. However, this imposes additional costs for maintaining data consistency in the storage. It must remain available, replicated, while workload on storage nodes should be uniformly distributed. Data load is controlled by a distribution algorithm (or distribution function) that selects nodes on which data must be stored. If network topology changes, data should migrate in order to remain available for clients. DHTbased algorithms are widely used in P2P network [5,12]. CEPH [14] object storage uses Controlled, Scalable, Decentralized Placement algorithm of Replicated Data (CRUSH) [13]. This paper evaluates how effective these approaches can be in a distributed decentralized object storage. Efficiency criterion is the rate of data migration. Migration is a necessary overhead to maintain the consistency of the storage system. A large number of migrations can significantly lower the efficiency of the entire system by reducing data availability or increasing the probability of storage node overload. The more migrations are in the system, the less likely the client is to meet the declared quality of service.

2

Program Simulation of Data Migration

The intensity and amount of migrated data are examined in a simulation model. The model defines a set of nodes that have different attributes, or buckets in CRUSH terminology. Nodes are connected with a logical topology that determines how the system places objects in the storage nodes. Hash-ring [6] topology was used to examine DHT approach. In CRUSH, nodes are connected in a graph, where the vertices correspond to the attributes of the nodes, and the leaves are to the nodes themselves, see Fig. 1. Implementation of the CRUSH algorithm called network map [3].

Node1 Capacity:500GB Price:$1

/

Capacity:100GB

Price:$2

Drive:SSD

Node4

Node3

Capacity:500GB

Node1

Node2

Price:$1

Node2 Capacity:500GB Price:$1

Node3 Capacity:500GB Price:$2

Node4 Capacity:500GB Price:$2

Fig. 1. Topology representation for CRUSH and hash ring

466

A. Vanin et al.

Simulation is performing in two stages. The whole procedure is briefly described in Algorithm 1. At the first stage, the model generates a stream of objects. Each object proceeds through a placement function that produces the set of storage nodes. These nodes have a finite capacity. Simulation stops at first storage failure: when there is no free space for the object in the storage node. At the second stage, the topology is expanded with a few nodes, filled gray in Fig. 1. Each uploaded object from the first stage proceeds through placement function once again. If the locations at the second stage have changed, then the object migrated in the storage system.

Algorithm 1. Migration simulation 1: procedure Migration(O, T1 , T2 ) 2: Counter ← 0 3: N ← length(O) 4: for k ← 1 to N do 5: P1 ← P lacement(T1 , Oi ) 6: P2 ← P lacement(T2 , Oi ) 7: if P1 = P2 then 8: Counter ← Counter + 1 9: end if 10: end for 11: return Counter ÷ N 12: end procedure

 Set of objects and two topologies

 Set of storage nodes  If the placement has changed,  increase the counter

All experimental results presented in this paper provided with confidence intervals of Student’s T distribution with α = 0.05.

3 3.1

CRUSH-Based Storage with Dynamic Topology Topology in Open Storage Systems

Paper [13] describes the CRUSH. This algorithm places objects in a distributed object storage system in a controlled and predictable way, achieving a uniform load distribution over nodes. Paper [3] proposes the use of the CRUSH in open object storage systems. Unlike proprietary closed systems, such systems work in untrusted dynamically changing environment without a single point of control over the network. Nodes could be provided by different unrelated authorities, therefore storage system becomes a platform for node owners to provide storage as a service. Provide efficient data storage in such environment can be really tricky, but CRUSH defines weight coefficients for the storage nodes. In Eq. 1, CRUSH uses both hash distance from node i to the stored object x and the weight of node wi itself to calculate a numeric characteristic of node ci . Nodes with lowest c store the object.

Data Migration Rate of the CRUSH-Based Distributes Storage

ci (x, r) = f (wi )hash(x, r, i)

467

(1)

Storage system can determine weight function on its own. It could be represented as reputation value based on P2P interaction, node capacity parameter, or even storage pricing [1]. For the experiments we defined weight function as a multiplication of normalized node capacity c and storage price p, see Eq. 2. f (wi ) = c¯i p¯i

(2)

With this weight function, we placed objects in the model and expanded the topology. Results presented in Fig. 2. 0.8 non-weighted expansion -10% price expansion +10% price expansion -10% capacity expansion +10% capacity expansion

0.7

Object migration ratio

0.6

0.5

0.4

0.3

0.2

0.1

0 0

0.2

0.4 0.6 Topology expansion ratio

0.8

1

Fig. 2. Object migration ratio by nodes expansion with different weights

While all nodes are the same, 2x topology expansion leads to the 50% object migration. However, node weights influence migration ration: if there are more profitable nodes in the system, objects will try to migrate there. Deviation from the non-weighted expansion can be controlled by normalization function: capacity weight is less significant than price weight in this example. 3.2

Migration Ratio at Different System Load

In the first experiment, the model generated objects until storage failure: if the amount of stored objects is more than a capacity parameter. Overall system load

468

A. Vanin et al.

was about 80% at the end of the first simulation stage. Model went from the transient state to the steady state. If we stop this stage at any specific system load limit, migration rate will be the same, see Table 1. This allows to exclude system load parameter from the model and make it more robust. Table 1. Migration rate at different system load System load Migration ratio 25% expansion 50% expansion 100% expansion

3.3

0.1

0.201 ± 0.003

0.331 ± 0.002

0.499 ± 0.004

0.2

0.201 ± 0.002

0.332 ± 0.003

0.500 ± 0.003

0.3

0.201 ± 0.002

0.332 ± 0.001

0.499 ± 0.002

0.4

0.200 ± 0.001

0.334 ± 0.001

0.499 ± 0.002

0.5

0.199 ± 0.001

0.333 ± 0.002

0.499 ± 0.002

0.6

0.200 ± 0.001

0.334 ± 0.002

0.500 ± 0.002

0.7

0.200 ± 0.001

0.333 ± 0.002

0.500 ± 0.001

0.8

0.200 ± 0.001

0.333 ± 0.001

0.500 ± 0.001

General and Specific Storage Policies

With the graph topology CRUSH allows to define flexible placement rules for the objects. Since every node has attributes, the data owner can filter some nodes by its attributes. We call such placement rules as specific policies. In Fig. 3 there is a specific policy to store data on nodes with attribute A. There are also general policies. They do not define any specific node attributes.

/

Attribute:A

Node1

Node2

Attribute:C

Node5

Attribute:B

Node6

Node3

Node4

Fig. 3. CRUSH topology with specific policy (gray) and expanded node(red) (Color figure online)

Previously we expanded CRUSH topology in a symmetric way: at the 1.0 expansion ratio every node had a pair with the same attributes. But this is

Data Migration Rate of the CRUSH-Based Distributes Storage

469

not very accurate in the real-world environment. We add new model parameter φ= E A where E is a set of attributes in expanding nodes and A is a set of all attributes in the graph. In Fig. 3 there is a one expanded node with one out of three attributes, therefore φ = 13 . If the storage system store data by general policies, migration ratio does not affected by φ, see Fig. 4. However specific policies may significantly lower migration rate as soon as φ tends to zero. With φ = 1 migration ratio will met worst case scenario with up to 50% migration if the topology graph size doubled. 0.6 general policies, phi=0.2 specific policies, phi=0.2 specific policies, phi=0.7 0.5

Object migration ratio

0.4

se

0.3

t rs

ca

o

W 0.2

0.1

0 0

0.2

0.4 0.6 Topology expansion ratio

0.8

1

Fig. 4. Object migration ratio by nodes expansion with different φ and storage policies

3.4

DHT Approach

DHT and CRUSH are based on the hash function that used to decide the location of the object. Despite the fact that CRUSH is designed to predictably reduce randomness in the placement function, P2P networks still actively use DHT as a storage cache. To place the data, each node calculates a hash distance between hash of the data and the hash of the node (3). Nodes P with minimal hash distance will store the data (4). distance(x, y) = |hash(x) − hash(y)|

(3)

N = {N1 , N2 , . . . , Nm }, min distance(n, obj) = P

(4)

n∈N

470

A. Vanin et al.

This called consistent hashing. CRUSH also uses consisting hashing after filtering nodes and attributes. Therefore DHT has the migration ratio results as CRUSH with general policies only. It is enough to build efficient distributed caches. They do not need active replication of stored data because cache miss is a regular situation. But flexible work with node attributes is mandatory for distributed object storage.

4

Conclusion

In this work, we built a simulation model for assessing the migration ration in a CRUSH-based distributed object data storage. With this model, the one can evaluate the effects of node weight coefficients to find the optimal weight and normalizing functions for a specific data storage system. With this model we found out that the migration ratio does not depend on the system load. The more specific policies there are in the system, the less migration there could be. However, it depends on the structure of the network topology change, which in this paper defined by φ parameter. In practice the larger the system becomes, the less migration occurs in it. If the system has a small number of nodes, then it is recommended to apply new topology in several steps to avoid large migration waves. Further research will be aimed at studying the influence of different normalization methods of node parameters for the CRUSH weight function. Performance evaluation will be done using this model.

References 1. Research Plan for Distributed Decentralized Blockchain-based Storage Platform (2018). https://github.com/nspcc-dev/research-plan/blob/master/research plan.pdf. Accessed 5 Nov 2019 2. Yandex Cloud. How to use API .https://cloud.yandex.ru/docs/storage/s3/. Accessed 8 June 2020 3. Bogatyrev, A., Liubich, S., Wahle, F., Bogatyrev, S., Vanin, A.: The model of network map and data placement in the distributed decentralized storage platform. In: Proceedings of the 10th Majorov International Conference on Software Engineering and Computer Systems. CEUR-WS (2018) 4. Bogatyrev, V.: Fault tolerance of clusters configurations with direct connection of storage devices. Autom. Control Comput. Sci. 45, 330–337 (2011). https://doi. org/10.3103/S0146411611060046 5. Kaashoek, M., Karger, D.: Koorde: a simple degree-optimal distributed hash table (2004). https://doi.org/10.1007/978-3-540-45172-3 9 6. Karger, D., Lehman, E., Leighton, T., Panigrahy, R., Levine, M., Lewin, D.: Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the world wide web. In: Proceedings of the Twenty-Ninth Annual ACM Symposium on Theory of Computing, pp. 654–663. STOC 1997, Association for Computing Machinery, New York, NY, USA (1997). https://doi.org/10.1145/258533. 258660, https://doi.org/10.1145/258533.258660

Data Migration Rate of the CRUSH-Based Distributes Storage

471

7. Muralidhar, S., et al.: f4: Facebook’s warm blob storage system. In: 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14), pp. 383–398 (2014) 8. Noghabi, S.A., et al.: Ambry: linkedin’s scalable geo-distributed object store. In: Proceedings of the 2016 International Conference on Management of Data, pp. 253–265 (2016) 9. Paulsen, J.: Enormous Growth in Data is Coming - How to Prepare for It, and Prosper From It. https://blog.seagate.com/business/enormous-growth-in-data-iscoming-how-to-prepare-for-it-and-prosper-from-it. Accessed 1 June 2020 10. Ratnasamy, S., Francis, P., Handley, M., Karp, R., Shenker, S.: A scalable contentaddressable network. In: Proceedings of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 161–172 (2001) 11. Spirovska, K., Didona, D., Zwaenepoel, W.: Optimistic causal consistency for geo-replicated key-value stores. 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 2626–2629 (2017) 12. Stoica, I., Morris, R., Karger, D., Kaashoek, M., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup service for internet applications. ACM SIGCOMM Comput. Commun. Rev. 31 (2001). https://doi.org/10.1145/964723.383071 13. Weil, S.A., Brandt, S.A., Miller, E.L., Maltzahn, C.: Crush: controlled, scalable, decentralized placement of replicated data. In: SC 2006: Proceedings of the 2006 ACM/IEEE Conference on Supercomputing, pp. 31–31 (2006) 14. Weil, S., Brandt, S., Miller, E., Long, D., Maltzahn, C.: Ceph: a scalable, highperformance distributed file system, pp. 307–320 (2006)

Reduction of the Energy Consumption on Preliminary Signal Processing in Vibration Monitoring Networks Vitaly Morozov and Konstantin Alikin(B) V.A. Trapeznikov Institute of Control Sciences of RAS, 65 Profsoyuznaya street, Moscow 117997, Russia [email protected], [email protected] https://www.ipu.ru

Abstract. Energy consumption reduction is of utmost importance for Internet of Things. This pertains especially to vibration monitoring networks usually consisting of plethora sensors and components for preliminary data processing. Such networks have to run uninterruptedly for long periods of time, for instance as a part of jerks and oscillation measurement systems used for earthquake registration or large building vibration monitoring. In these systems electronic data processing equipment is abundant. Lowering of the operating current and voltage in electronic equipment tends as a rule to increase the processing error. It is true particularly of the scaling amplifiers widely used in the course of data processing for preamplification of weak signals from analog sensors. In the paper, we propose an efficient method and corresponding circuit design for reproduction error suppression in micropower scaling amplifier by the additional feedback loop. The implementation of additive negative feedback by error signal supports substantial total scaling error reduction. Experiments and simulation carried out have verified manifold error reduction by the proposed structure in parallel with lowering of amplifiers energy consumption. Keywords: Internet of things · Vibration sensors · Energy consumption · Scaling amplifier · Error suppression · Additive negative feedback

1

Introduction

Autonomous wireless sensors serve as the backbone of the Internet of Things (IoT) [1]. These sensors do not have an external power supply and their lifespan is typically limited by the lifespan of their battery nodes [2]. In [3] authors discuss a network of sensors that can extract (harvest) the energy from the surrounding environment (wind, solar, etc.) and highlight the importance of energy consumption optimization. Wireless networks consisting of a great number of autonomous vibration sensors are widely used for various IoT applications (industrial arrangements c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 472–483, 2020. https://doi.org/10.1007/978-3-030-66242-4_37

Energy Consumption Reduction in Vibration Monitoring Networks

473

monitoring, earthquake registration [4], structural health monitoring for critical infrastructure [2], etc.). While the energy consumption of the micro-controller unit and the wireless communication modules accompanying the sensors may be significantly reduced by employing triggered wake-up and data accumulation, the analog preprocessing equipment (preamplifiers, filters) has to operate uninterruptedly. Therefore, an urgent problem for vibration monitoring systems designer is lowering of the energy consumption of the analog electronic parts. Most kinds of vibration sensors, for instance, electromagnetic produce relatively weak signals. Thus, preliminary amplification of the sensor signal by the factor of 50–100 is necessary before filtration and conversion into digital form. Consequently, the power consumption rises significantly, because amplifiers are a major part of the analog preprocessing hardware in the systems discussed. Advances in semiconductor technology have led to a substantial decrease of microcircuit amplifiers power consumption. Unfortunately, it attended with a substantial rise of frequency dependent error occurred by the signal amplification [5]. In the paper, we suggest a circuit-configurational method for lowering processing errors caused by the signal amplification. Our method permits the use of micropower amplifiers in inverting scaling amplifiers instead of more powerconsuming high-speed ones.

2

Structure of a Scaling Amplifier

Preamplifiers for sensor signals are based as a rule on operational amplifiers (OA) with negative feedback circuit. The commonly used structure of scaling amplifiers (SA) consisting of the operational amplifier OA with negative feedback resistors Rin , Rf is shown in Fig. 1. Such a configuration has a given amplification factor of Kg = Rf /Rin .

Rf

Rin OA Uin

Uout

Fig. 1. Circuit of a commonly used scaling amplifier

In spite of a rather steady performance, variable error components occur in this structure during the signal processing, particularly: 1. An amplitude error caused by the inaccuracy of the amplification factor and nonlinearity of the transfer function.

474

V. Morozov and K. Alikin

2. A frequency dependent error leading to high frequency components weakening in the output signal spectrum. The zero shift in the preamplifier output signal has a negative impact on system performance in some applications. To mitigate the first of the aforementioned errors it is enough to hold the ratio Rf /Rin to the highest possible precision. The choice for precise resistive components on the market is sufficient. Additionally, the insertion of a regulated weak DC signal to the SA input eliminates the output voltage shift. Next we go on considering the frequency dependent error. Let us define the amplification factor in the structure shown in Fig. 1 for the case when OA has a limited bandwidth in the high frequency region. The requirements of stability by deep degrees of negative feedback are imposed on the OA in this and similar circuits. Consequently, the transfer function for OA in Laplace operator form ought to be of first order: K0 /(1 + sT ), where K0 — direct current amplification factor of the OA, T — time constant for the OA as a first order system. Therefore, on the base of the well-known relations for control systems with negative feedback, the real amplification factor of the preamplifier (Fig. 1) would be expressible as a transfer ratio for a system with negative feedback coefficient equal to Rin /Rf : Kr =

K0 /(1 + sT ) , 1 + K0 /(1 + sT )(Rin /Rf )

(1)

differing from the rated meaning Kg by the value: ΔK = Kg − Kr .

(2)

After the substitution Kg = Rf /Rin and some simplifications we can get from (1) and (2) the equation for the difference between given and real amplification factor values: Kg 2 (1 + sT ) . (3) ΔK = K0 The difference defined above causes the occurrence of the error component in the output signal of the preamplifier. This component grows with the amplified signal frequency as follows: ΔUout = Uin ΔK = Uin

Kg 2 (1 + sT ) . K0

(4)

The ratio of the retrieved error component to the full output voltage value Uout equals ΔUout Kg (1 + sT ) = . (5) Uout K0 It is possible that the error voltage ΔUout calculated from (4) is out of the allowable range defined by the system requirements, the type of amplifier chosen and the frequency needed. In the present state of electronic components,

Energy Consumption Reduction in Vibration Monitoring Networks

475

this is very possible, because of a tendency toward lowering amplifiers power consumption [5]. Let us consider as an example a micropower operational amplifier LTC2063 with supply current 2 µA, operating supply voltage 1.7 to 5.25 V, gain-bandwidth product GBP = 20 kHz, K0 = 140 dB [6]. Before the error calculation in accordance with the formula (4) it is necessary to find the time constant T for the chosen amplifier. For this purpose a wellknown relation: T = K0 /(2πGBP ) may be used, of which after the substitution of the data presented above follows that T = 79.6 sec. Further calculation shows that the frequency dependent relative error for scaling unit with Kg = 100 based on the chosen OA is equal to 0.05 or 5% by the frequency 10 Hz and further grows with the frequency roughly linearly according to (5). Taking into account that in many cases the frequencies of registered vibration signals are up to 100 Hz, the value of the frequency dependent error calculated above is completely unsuitable. As an example, let us consider one more contemporary microcircuit, AD8502 consisting of two micropower operational amplifiers produced by complementary MOS technology and featuring a maximum supply current of 1 µA per amplifier. AD8502 can operate from a single-supply voltage of 1.8 V to 5.5 V or a dualsupply voltage of ±0.9 V to ±2.75 V. With its low power consumption the AD8502, according to the manufacturer recommendations, is ideally suited for a variety of battery-powered applications including smoke and fire detectors and vibration monitors. It is a perfect amplifier to use for the demonstration of the method proposed in the paper. It has following dynamic performance characteristics: GBP = 7 kHz, K0 = 120 dB [7]. However, obtaining the time constant for this type of amplifier directly from the equation T = K0 /(2πGBP ) is rather cumbersome, because in the deduction of (4) we presumed the phase margin of 90◦ . But according to the datasheet for the amplifier the phase margin is 60◦ . It means that the approximation of the amplifier as a first order system is not valid for this amplifier. Rough estimation of the time constant for AD8502 gives the real value of T ≈ 15 s. From the Eq. (4) the expected value of the reproduction error is approximately 1.3% 10 Hz. This value, similarly to the one calculated for LTC2063, is too high for the applications discussed. The method for the extraction of the error component from the total output voltage of an inverting scaling amplifier was described in [8]. According to the method additive resistors equal to Rin and Rf are connected in series between the input and the output of the SA. The common point of the resistors is connected with the input of the additional non-inverting amplifier, that has an amplification factor of Kg + 1 (Fig. 2). On the output of the structure shown in Fig. 2 occurs the error signal of the SA containing the error component ΔUout defined in (4). It is clear that if the extraction of this component is possible, a design of an additive negative feedback loop for the error suppression will be realizable—see the Fig. 3a. In this structure the EA is an amplifier of the error signal in terms as used in control systems theory [9]. Additive resistors chain Rin –Rf in Fig. 2 produces a

476

V. Morozov and K. Alikin

Uout

Uin SA

Rin

Rf Kg + 1 ΔUout

Fig. 2. Circuit for the scaling error extraction

Rf

Rin Uin

SA

Uout

OA1

Uin

Uout

Rerr EA EA a) structure with negative feedback

b) electrical circuit

Fig. 3. Scaling amplifier with an error suppression loop

reference signal for error component extraction. Resistor chain deteriorates the component ΔUout by Kg + 1 times additive amplifier regains it. Therefore, the amplification factor of the EA is equal to one and as the only amplifying element in the loop, we can use an SA with an additive input. The summing input for error signal may be achieved by the connection of additive resistor Rerr to the summing point of the main OA (Fig. 3b). It is evident that in the structure presented in Fig. 3b the amplification factor of the additive negative feedback loop is equal to Kerr = KEA · Rf /Rerr . As mentioned above the EA is intended only for the extraction of the error signal ΔUout without amplification so that KEA = 1 and the equation Kerr = Rf /Rerr is valid. Application of the well-known expression for the error signal suppression in systems with a negative feedback to the structure in Fig. 3b gives:

Energy Consumption Reduction in Vibration Monitoring Networks  ΔUout 1 Rerr = = , ΔUout Kerr Rf

477

(6)

 where ΔUout is the error component value in the presence of the additive negative feedback. Consequently, controlling the value of the error signal suppression is possible by the choice of a proper Rerr value.

3

Simulation

The modeling was carried out using LTspice XVII software to determine the frequency dependent error in the circuit shown in Fig. 3b with and without a negative feedback. The manufacturer provided model of the micropower twin operational amplifier AD8502 [7] was used with the other components values as follows Rin = 100 kΩ, Rf = 10 MΩ, so that the rated amplification factor is Kg = 100. The operating supply voltage was set to ±2.75 V and the input signal amplitude to Uin = 20 mV. Scaling error—the relative difference between the given value of the output voltage equal to 2 V and the actual voltage for varying frequencies without additional error suppression we can see in Fig. 4, curve a. The similarly defined difference in presence of an additional negative feedback loop (Rerr = 500 kΩ) is shown in Fig. 4, curve b. Hence it follows that a negative feedback by the error voltage with depth mentioned above reduces the scaling error 50 Hz frequency by the factor of 8.

4

Discussion and Recommendations

It follows from the previous results of simulation that negative feedback by error voltage with depth mentioned above does not reduce scaling error in the proposed circuit design by the factor calculated from (6). One can see comparing curves a and b in Fig. 4 that at 40–50 Hz frequencies real error reduction factor is approximately 10 instead of 20 determined by the ratio between component values used for the simulation Rerr /Rf = 1/20. The significant difference occurs because the amplification factor of the error signal extractor was assumed to be equal to one at all frequencies for the calculation of the error compensation ratio (KEA = 1, see formula (6) deduction). In other words, assumption KEA = 1 means that the EA (Fig. 3b) precisely reproduces the scaling error signal value that is used thereafter as the negative feedback signal. That is not true in fact, because in the negative feedback loop there are two serially connected components: the SA with its additive input and the EA. Each of the components has a first order transfer function by s but in common, we have an oscillatory element in the negative feedback loop. This will disrupt the stability and the precision of the input signal reproduction in the SA as a whole.

478

V. Morozov and K. Alikin

20 a) Kg = 100, Kerr = 0 b) Kg = 100, Kerr = 20

17.5

Scaling error, %

15 12.5 10 7.5 5 2.5 0 1

10

20

30 40 Frequency, Hz

50

60

Fig. 4. Scaling error with and without an error suppression loop

Let us consider the situation more thoroughly. As it may be seen from Fig. 2 the error signal, attenuated in relation to ΔUout value during extraction by additive chain Rin –Rf is subsequently amplified by a factor of Kg + 1. For discussed values of Kg EA amplification factor is Kg + 1 ≈ Kg . Thus EA transfer function is practically identical with transfer function KEA for the OA itself without an additive error suppression loop as shown in Fig. 1 (provided that the EA and OA1 are cells of a twin operational amplifier microcircuit). Therefore, the transfer function for error signal may be considered as of satisfying Eq. (1) with sufficient precision. On rearrangement and after simplification the result can be written as: Kg . (7) KEA ≈ 1 + sT · Kg /K0 Similar relation describes SA transfer function by additive input having amplification Kerr : Kerr . (8) KSAerr ≈ − 1 + sT · Kerr /K0 Evidently, there are two serially connected elements in the feedback loop each of them having a first order transfer function. Let us denote time constants

Energy Consumption Reduction in Vibration Monitoring Networks

479

T1 = T · Kg /K0 for KEA and T2 = T · Kerr /K0 for KSA and write down the transfer function for closed negative feedback loop as a second order relation KNF = −

Kg Kerr Kg Kerr =− 2 . (1 + sT1 )(1 + sT2 ) s T1 T2 + s(T1 + T2 ) + 1

(9)

To analyze the denominator of the Eq. (9) let us substitute the values of T1 = 1.3 · 10−3 , T2 = 2.6 · 10−4 obtained from the previously provided amplifier parameters. Further calculations show that the denominator of the Eq. (9) has complex-valued roots. Consequently the negative feedback loop presents an oscillatory unit. Therefore, SA frequency response will have a peak on a frequency corresponding with the pole of function (9). Plot of the frequency-dependent amplification error for the SA with an error suppression loop obtained by simulation in extended frequency range is presented in Fig. 5. It is obvious that the frequency response peak discussed above has an adverse effect on the error at frequencies much lower than the corner frequency corresponding with the pole of the function (9). This is the reason why the scaling error plot in Fig. 5 differs significantly from results of calculation by Eq. (6). Another peculiarity of the plot in Fig. 5 is the error value being limited at a level slightly exceeding 30%. This is caused by the saturation of the OA output stage. Because of the frequency response peak mentioned above, on some frequencies the OA becomes saturated and the output voltage reaches a value close to its power source voltage of 2.75 V. The difference with the rated undistorted value of 2 V (Uin = 20 mV, Kg = 100) is approximately 33%.

35 Kg = 100, Kerr = 20

Scaling error, %

30 25 20 15 10 5 0 100

101 Frequency, Hz

102

Fig. 5. Scaling error with an error suppression loop connected

480

V. Morozov and K. Alikin

Eliminating the peak mentioned above is possible with the help of the pole compensation method widely used in electronic design—insertion of a feedforward element into the negative feedback circuit. For the pole compensation, it is practical to choose the negative feedback loop transfer function with the minimal time constant value. From the comparison between the values of T1 and T2 in (9) it is obvious that T2 ≤ T1 , because the value of Kg is usually higher than Kerr . Let us calculate time T2 constant for AD8502 micropower operational amplifier with amplification factor Kerr = 20 by additive input selected earlier as an example for the simulation of the error suppression loop performance (Fig. 4). The previously calculated value of the inherent time constant for the AD8502 amplifier is T ≈ 15 s and for Kerr = 20, T2 = T · Kerr /K0 ≈ 0.3 ms. This is the time constant, which should be compensated to eliminate the undesired peak in the frequency response. Pole compensation network can be implemented as a capacitor C connected in parallel across any serial resistor in the loop, particularly Rerr or Rf . In the former case, the required capacity is C = T /(2.2Rerr ) = 270 pF, in the latter case C ≈ 14 pF. It is obvious that the latter value is more convenient for the practical implementation. In the complete electrical circuit of the SA with the additive negative feedback loop (Fig. 6), resistor Rf is shunted with a capacitor C by the non-inverting input of OA2.

Rf Rin Uin

OA1

Uout

Rerr Rf

OA2

Rin

Rin

C

Rf

Fig. 6. Circuit of a scaling amplifier with a feedforward network Rf C

Energy Consumption Reduction in Vibration Monitoring Networks

481

Kg = 100, Kerr = 20 Kg = 100, Kerr = 50

1.4

Scaling error, %

1.2 1 0.8 0.6 0.4 0.2 0 0

25

50

75

100 125 150 Frequency, Hz

175

200

225

Fig. 7. Error suppression with different Kerr values and pole compensation

The compensation of the pole having lower time constant T2 in (9) by a 15 pF capacitor connected in parallel across a 10 MΩ resistor as shown in fig. 6 was verified by simulation results for Kerr = 20 and 50 for AD8502 amplifier [7]. As shown in Fig. 7 the scaling error compared to a traditional scaling amplifier error (curve a in Fig. 4) goes down as Eq. (6) predicts. Figure 8 demonstrates the changes in the frequency response of the preamplifier designed as an element for sensor signal processing. From this figure, one can see that the simple pole compensation circuit may effectively suppress the increase of the amplification above the given value at some frequencies. Consequently, the resulting frequency response characteristic is flat until 250 Hz. The exact frequency depends on the chosen values of Kerr and the capacitor used for the pole compensation.

482

V. Morozov and K. Alikin

50

40

K, dB

30

20

10

Kerr = 0 Kerr = 20 Kerr = 20 with pole compensation

0

−10

100

101

102 Frequency, Hz

103

104

Fig. 8. Frequency responses of preliminary signal processor (preamplifier) as a whole with different error compensation variants

5

Conclusion

The method of the error suppression presented in the paper allows a substantial reduction of the signal processing error in inverting scaling amplifiers. It should be mentioned that not only the frequency dependent error component is suppressed by this method, but also the total difference of the output signal from the rated value. The main additional element required in order to realize the loop of error suppression described above is another operational amplifier. An important point is that this additional component may be equal in power consumption to the main amplifier. Therefore, an effective application of readily available twin micropower operational amplifiers is possible. Doubling of the supply current associated with the use of an additional operational amplifier does not substantially influence the effectiveness of the proposed method, because the saving in energy consumption from its application is significantly higher.

Energy Consumption Reduction in Vibration Monitoring Networks

483

Acknowledgements. The reported study was funded by RFBR, project number 1929-06043.

References 1. Atzori, L., Iera, A., Morabito, G.: The Internet of Things: a survey. Comput. Netw. 54(15), 2787–2805 (2010). https://doi.org/10.1016/j.comnet.2010.05.010 2. Noel, A.B., Abdaoui, A., Elfouly, T., Ahmed, M.H., Badawy, A., Shehata, M.S.: Structural health monitoring using wireless sensor networks: a comprehensive survey. IEEE Commun. Surv. Tutorials 19(3), 1403–1423 (2017). https://doi.org/10. 1109/comst.2017.2691551 3. Dudin, A.N., Kim, C.S., Dudin, S.A.: Optimal control by a node of wireless sensor network with quality of transmission depending on the amount of harvested energy. In: Distributed Computer and Communication Networks: Control, Computation, Communications (DCCN-2019), pp. 29–36 (2019) 4. Kinoshita, S.: Kyoshin Net (K-Net), Japan. Int. Geophys. Ser. 81(B), 1049–1056 (2003) 5. Kolombet, E.A.: Microelectronic Means of Analog Signal Processing. Radio i Svyaz’, Moscow (1991). (in Russian) 6. LTC2063 datasheet and product info — analog devices. https://www.analog.com/ en/products/ltc2063.html. Accessed 10 Sept 2020 7. AD8502 datasheet and product info — analog devices. https://www.analog.com/ en/products/ad8502.html. Accessed 10 Sept 2020 8. Babayan, R.R., Morozov, V.P.: Bandwidth increase of an electromagnetic sensor signal amplifier (in Russian). Sensors Syst. 212(3), 62–65 (2017) 9. Goodwin, G.C., Graebe, S.F., Salgado, M.E.: Control System Design. Prentice Hall, Upper Saddle River (2001)

Stability and Sustainability of Cryptotokens in the Digital Economy N. V. Apatova , O. V. Boychenko , O. L. Korolyov , I. V. Gavrikov(B) , and T. K. Uzakov Institute for Economics and Management, Crimean Federal University, Simferopol, Russia [email protected]

Abstract. The paper examines the idea of cryptocurrencies and its sustainability in the digital economy. The specifics of mining are examined from several points of view: in terms of technical requirements, economic theory and current costs. An analysis of the role of cryptocurrencies in the economy is conducted. The impact of cryptocurrency mining on the economy and environment is described. Several solutions to the problem of cryptocurrency volatility and mining are presented, including smart electricity monitoring powered by internet of things (IoT) and smart energy grids, GIS-powered heat monitoring, and integration of cryptotoken mining into smart city infrastructure. Keywords: Cryptocurrency · Digital economy Smart cities · Internet of Things

1

· Sustainability ·

Introduction

The concept of virtualization appeared in the 1990s. Virtualization involves replacing real objects and actions with their images and relationships, and it addresses two main aspects: 1) virtualization of society: traditional institutions prescribe to do real things and real actions, but people instead work with virtual objects – images, which makes social institutions a kind of virtual reality; 2) virtualization of social institutions, which includes economics, politics and culture. “The digital economy is a socioeconomic activity mediated by software and enabled by telecoms infrastructure” [14]. It also includes the social sphere, which is reflected on the Internet as mobile health, mobile education, smart homes, and buildings powered by the Internet of Things. Virtualization has a dual nature, as it is at the same time a system that consists of separate, interconnected elements, and a process that occurs both in each element and the system as a whole. In financial virtualization processes, three areas can distinguished. The first is the emergence of electronic payments, plastic payment cards and Internet banking. Second, financial markets, online c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 484–496, 2020. https://doi.org/10.1007/978-3-030-66242-4_38

Stability and Sustainability of Cryptotokens in the Digital Economy

485

trading in currency and securities. Third, the creation of cryptocurrency and the associated blockchain technology. Bitcoin is the first fully virtual currency, simultaneously neither a regular commodity made to satisfy needs or desires, nor a virtual unit backed by existing currencies. An important metric for assessing the popularity of cryptocurrencies, of which there are now thousands, is their capitalization – the total market value of the tokens in circulation. Bitcoin’s market capitalization in early January 2018 approached $300 billion, and resides at approximately $166 billion at the time of writing [3]. Blockchain technology, based on distributed data storage and the organization of direct connections between financial market agents, and the technology behind most modern cryptocurrencies, makes transactions safe and transparent, reducing or eliminating corrupt behavior in the financial sector and serving as a publicly auditable evidence base for currency flows. However, the emergence and spread of cryptocurrencies also means that issuing currency is no longer the sole prerogative of the state or a central banking authority, and threatens the very existence of traditional financial institutions, such as banks and exchanges, which are inherently speculative intermediaries.

2

Cryptocurrency Mining

Since the Bitcoin architecture, as formulated by Nakamoto, was by definition completely open (public) and had no concept of trust in individual nodes, it was necessary to formulate an algorithm for coordinating changes in such a system that would take into account possible malicious behavior of nodes. This algorithm was called the consensus algorithm [12]. In proof-of-work-based (PoW) cryptocurrencies, transactions are confirmed by means of “mining” – a decentralized process of solving cryptographic tasks. If the task is successfully solved by a “miner”, a new block is created in the chain, which becomes its integral part and contains information about the last N transactions (N being a variable number with an average value of about 2000). Since all subsequent blocks are cryptographically linked to the current one, each of them is an additional confirmation of the transaction. In order to consider a transaction validated, at least one block containing it is required, but in a modern cryptocurrency context, a transaction is guaranteed to be confirmed when it has about 6 confirmations in a blockchain [9]. In cryptocurrencies that use public blockchains with a PoW consensus algorithm, miners are usually paid with units of that same cryptocurrency for creating a new block. However, along with the payment for creating a block, miners also receive a commission from the users of the cryptocurrency for each transaction, which serves as motivation for including that particular transaction in the block they are creating. Other consensus algorithms also exist. One popular alternative to proof-ofwork is proof-of-stake (PoS) algorithms, where the creator of each subsequent block in the chain is selected using a combination of random selection and selection based on their stake in the system, i.e., the amount of funds in the account.

486

N. V. Apatova et al.

The choice on the basis of only the account size will inevitably lead to centralization of rights to transaction verification, due to which there are several different subtypes of PoS algorithms, many of which select the stake based on the amount of funds and how long these funds were in the account for. Other custom-built and proprietary consensus algorithms are out of scope for this paper. PoS algorithms do not use a mining process as such, and therefore are also out of scope. Proof-of-work algorithms, however, are very widespread and do use mining, which is why PoW-based cryptocurrencies, and Bitcoin as the archetypal PoW-based cryptocurrency, are the focus of this paper. 2.1

Quasi-legal Mining

Bitcoin mining operations are computationally expensive, and therefore necessitate the use of specialized equipment and the aggregation of computational power into pools. This aspect of the mining process will be discussed in more detail later on. However, there are cryptocurrencies other than Bitcoin, which, due to Bitcoin’s hegemony in the market, are called “alternative” cryptocurrencies or “altcoins”. These differentiate themselves from Bitcoin not only in name, but often also in the algorithms they use for achieving consensus. Often, this means that the mining process for these cryptocurrencies is significantly less computationally expensive. This presents an opportunity for extracting greater value using more conventional hardware, down to consumer devices like office PCs and smartphones. For well-intentioned users and vendors, this means that a much wider audience can meaningfully participate in the cryptocurrency’s lifecycle, working to mine it without needing to invest into expensive specialized hardware, and widens the cryptocurrency’s community. Consensual, opt-in mining could transform revenue generation for content creators on the web. Still, these opportunities are taken advantage of by malicious agents as well. “Cryptojacking” is a new kind of malware propagated primarily through advertisement networks and vulnerabilities like cross-site scripting (XSS). It involves uploading a cryptomining script to a website, preferably a high-traffic one, which mines cryptocurrency without the visitor’s knowledge or consent. Monero is a cryptocurrency that is especially popular with cryptojacking malware, thanks to its heightened anonymity and privacy features. An in-depth systematic study of cryptojacking was performed by Hong et al. in [7].

3

Cryptocurrency and Value

Because cryptocurrency is a novel financial phenomenon, it can be difficult to estimate its true utility, price and value. Much of the research on the economics of cryptocurrencies focuses on Bitcoin as the archetypal cryptocurrency, but some studies consider other cryptocurrencies, or so-called “altcoins”, as well.

Stability and Sustainability of Cryptotokens in the Digital Economy

487

Fig. 1. Bitcoin market capitalization, price and 24-h trading volume, since mid-2013 [3]

3.1

Economic Role

The concept of cryptocurrency was initially born of a dream of decentralized money: a currency without a central bank or other controlling third party, issued algorithmically without even a strict need for trust between actors in the system. However, actual currencies fulfill the three basic functions of money: 1. Medium of exchange. Money is used as an intermediate medium of exchange for purchasing goods and services. 2. Unit of account. As money is used as a standard medium of exchange, it becomes the yardstick against which the value of goods and services is measured. 3. Store of value. Money as an asset retains value over time, subject to inflation and other adjustments. Upon further analysis, however, modern cryptocurrencies often fail at fulfilling some or all of these functions. The volatility and instability of cryptocurrencies are the main causes of cryptocurrencies’ low adoption as a means of payment. 1. Being a medium of exchange is arguably the easiest function to fulfill for any asset, as people can and do agree on using various assets and commodities as “money”. However, cryptocurrency’s ability to serve as a medium of exchange is often hampered by two factors: the relative technical difficulty of obtaining and exchanging them for fiat money, and the slow network speeds in cryptocurrency networks. Slow network speeds might not have been as significant of a problem were it not for the volatility of cryptocurrencies, which means that a transfer of cryptocurrency for a certain value may have an unpredictably different value upon arrival.

488

N. V. Apatova et al.

2. Volatility also influences cryptocurrencies’ ability to act as a unit of account, as 1 BTC or 1 ETH at one point in time may imply a drastically different value compared to a different point in time. 3. Volatility and instability again prevent cryptocurrencies from serving as a meaningful store of value. In 2010, Bitcoin was used (as a means of exchange) to indirectly purchase pizza at a rate of 10,000 BTC for 25 USD. In December 2017, a single BTC was worth a little under $20,000. Already in December 2018, its price fell to $3,300 – a 76% drop from the previous year. All of these factors paint traditional cryptocurrencies as a highly speculative asset. Movements in their price are often not tied to any market events, and poorly described by theoretical frameworks used for stocks and other assets. To combat the problem of wildly unstable prices, the cryptocurrency community has devised so-called “stablecoins” – cryptocurrency assets designed to be pegged against a fiat currency (most commonly the US dollar). They attempt to fulfill the main functions of money, and usually succeed, albeit at the cost of other factors, such as transparency and long-term viability. Such stablecoins, exemplified by the Tether cryptotoken pegged to the US dollar, are stabilized against fiat currency using various methods – in the case of Tether, via off-chain collateral in the form of liquid currency reserves. In a way, stablecoins serve as a medium of exchange, unit of account and store of value in the context of other cryptocurrencies, as opposed to the wider digital economy – they are used as the more “long-term” (on the scales typical of cryptocurrencies) store of value, and their being pegged to a fiat currency makes them a convenient medium of exchange and unit of account, as those functions are mirrored. The problems associated with stablecoins are often more regulatory in nature – in Tether’s case, questionable accountability and the difficulty in verifying the actual volume of collateral reserves against the issuer’s claims mar the otherwise viable cryptotoken concept. 3.2

Legal Framework

Today there is still no definite consensus in understanding the nature of cryptocurrency and its role in the digital economy. For example, a number of countries (Canada, Netherlands) consider cryptocurrency a currency, others (US, Germany) consider it a commodity. China and India have introduced a ban on the circulation of cryptocurrency, while the US and UK do not impose restrictions the development of cryptocurrency-related financial technologies. Legislation of cryptocurrencies is further complicated by their popularity among hackers and other malicious actors. The decentralized nature of cryptocurrencies, i.e., their lack of central oversight and control, and their privacycentric features make it difficult to establish a functional legal framework which requires personal accountability and central oversight. In Russian legislation, cryptocurrencies were a grey zone since 2014. However, a new bill, “On digital financial assets”, which will come into effect in 2021, defines and regulates cryptocurrencies and related digital technologies, including the

Stability and Sustainability of Cryptotokens in the Digital Economy

489

distributed ledger and smart contracts, in Russian legislation. Cryptocurrencies are classified as commodities that may be purchased, exchanged, and sold for fiat currency, but may not be used as legal tender for payment to Russian residents. Cryptocurrencies are therefore classed as investments, and the Central Bank is tasked with limiting risks to unqualified investors purchasing cryptocurrency. 3.3

Theories of Value

There exists a multitude of different approaches to defining a cryptocurrency’s value. In [10], an approach to evaluating the equilibrium price of Bitcoin using classical quantity theory of money is proposed. Li and Liao propose that the equilibrium between Bitcoin supply and demand, given B as the supply (amount awarded to a miner), equals B=

PY +S PB V

(1)

where P is the general price level of goods and services, Y is the quantity of goods and services traded using Bitcoin as a medium of exchange, PB is the current dollar value per unit of Bitcoin, V is the velocity of Bitcoin (the frequency at which a single Bitcoin token is used for purchasing goods and services), and S is the amount of Bitcoin demanded for speculative purposes. After several transformations, Li and Liao arrive at the equation for a socially optimal level of Bitcoin mining, balancing social benefit (non-speculative uses of Bitcoin) and cost of mining: M   s  F +c (2) Ni PB (B − S) = D i=1 where F is the mining equipment replacement cost, c is the average energy consumption per mining attempt, D is the total number of mining attempts per lifetime of mining equipment, Ni is the number of mining attempts per second for miner i, Ms is the socially optimal miner population. They contrast this equation with the equation for the actual level of bitcoin mining optimal for the mining business as a whole, as the mining business does not take into account whether the cryptocurrency is used speculatively or not: M    F +c (3) Ni PB (B) = D i=1 where M is the total miner population. Li and Liao then posit that Ms < M , and that as long as speculative demand for Bitcoin exists, the level of mining will necessarily be higher than socially desirable. Hayes in [6] analyzes Bitcoin value formation from a cost of production point of view. First, he calculates the average amount of Bitcoin that can be mined by a single miner in a day (24 h):   βρ × 3600 × 24 (4) BT Cday = δ × 232

490

N. V. Apatova et al.

where β is the current block reward (in BTC/block), ρ is the hashing power of the miner in gigahashes, δ is the current difficulty of a block in gigahashes/block. The dollar cost of mining per day is calculated by Hayes thus: Eday =

ρ × E × C × 24 1000

(5)

where ρ is the hashing power of the miner, E is the dollar price of a kilowatthour of energy, C is the energy consumption of the mining process in watts per gigahash. Therefore, the price of production of Bitcoin, according to Hayes, equals BT Cday Eday which serves as the lower bound of the Bitcoin market price, below which miners would be operating at a loss. Naturally, other factors are also at play when analyzing the value of Bitcoin for individual actors, such as personal speculative interest, ideological motivation, etc.

4

Mining Impact

Mining is potentially a very lucrative business, as depending on the price of a cryptocurrency, the block reward may be a significant sum. However, individual miners do not have sufficiently powerful equipment to make mining a reliably profitable business; additionally, it is more rational for individuals to share a smaller but guaranteed reward, as opposed to having a small chance at receiving a large reward. Due to this reasoning, miners come together in so-called “mining pools”, which are communities that combine individual miners’ computing power to increase the chance of solving the task of creating a block. Over the last few years, such mining pools have grown rapidly in size: for example, a little under half of all computing power in the Bitcoin network belongs to just three major Chinese pools [2]. However, the mining process is not without cost. Although cryptocurrencies are fully virtual and do not require raw materials for their creation, they do require one resource – electricity. Still, estimating the total electricity cost of cryptocurrency mining is difficult, as most mining operations do not openly share the plans and specifications for their facilities. However, some approaches to estimating the electricity cost of mining have been formulated for Bitcoin. Two such approaches were formulated in [17]. The first uses hashrates, power use and energy efficiency of specific mining equipment; this approach is useful for determining the lower bound of the total electricity cost, as it does not take into account the costs associated with cooling a large mining operation. Any computer produces waste heat, and specialised equipment designed for Bitcoin

Stability and Sustainability of Cryptotokens in the Digital Economy

491

mining produces a significant amount of it at a constant rate. Because of this, de Vries formulated a second approach based on production cost and lifetime cost of a mining machine, taking into account electricity costs for cooling as well. Extrapolating from some publicly available information on the energy consumption of mining facilities, this approach yields an approximate value for the total electricity cost of Bitcoin, with a model for predicting future trends. De Vries’ study indicated a lower bound of 2.55 GW and an approximate actual value of 7.67 GW, which converts to approximately 67 TWh per year. According to Digiconomist’s estimates [4], the total electricity cost of Bitcoin mining has remained relatively stable at 73 TWh per year since mid-2018, with a dip in early 2019 (shown on Fig. 2). This places Bitcoin squarely among the top 50 countries in terms of electricity consumption in the world, level with Israel and Greece.

TWh per Year

100

75

50

25

0 Jul '17

Jan '18

Jul '18

Estimated TWh per Year

Jan '19

Jul '19

Jan '20

Minimum TWh per Year BitcoinEnergyConsumption.com

Fig. 2. Bitcoin energy consumption index chart [4]

The energy efficiency of a single transaction is similarly poor according to Digiconomist, a single Bitcoin transaction costing the equivalent of approximately 400,000 VISA transactions in terms of electricity. The carbon footprint of cryptocurrency mining should also be taken into account, as many of the heaviest mining operations are located in China and other countries where coal and other non-renewables provide most of the available power. This negatively affects the environmental situation in the country, as well as other countries in similar situations – Digiconomist’s current estimates place Bitcoin’s carbon footprint level with that of the country of Syria. Because of this, the Chinese government has reportedly planned to ban cryptocurrency mining [5]. Alongside China, a ban on mining is being considered in Russia and India, while in Vietnam cryptocurrency mining activity is punishable by a fine. However, a ban on mining may lead to cryptocurrency’s total transformation

492

N. V. Apatova et al.

into a shadow business, the formation of underground pools, and increased rates of electricity theft. An analysis by Australian entrepreneur Nick Gogerty shows that 90% of the cost of cryptocurrencies is attributable to the cost of electricity used to produce them [16]. For each megawatt of electricity used to produce Bitcoin, approximately 0.65 tons of CO2 are emitted into the atmosphere [8,13]. However, it is difficult to estimate the true ecological impact of cryptocurrencies, since mining may take place in data centers and on dedicated mining farms on one hand, and in residential spaces on the other. This fact makes assessing the carbon footprint very difficult, compounded by the fact that there are many different types of equipment in use for mining. Cryptocurrency production equipment, while in constant operation, generates a large amount of waste heat. Without sufficient air conditioning of the mining facility, that equipment can overheat and fail. For the equipment to work properly, it is necessary to maintain a constant ambient temperature. Therefore, additional refrigeration equipment, air conditioners or fans are required, which in turn consume a significant amount of electricity. Further development and adoption of cryptocurrencies requires modernization and constant upgrades to mining farms. Thus, a significant amount of electronic waste is generated. Electronic waste is a type of waste containing electronic and other electrical devices as well as their parts. Electronic waste can be highly hazardous due to the substances they contain, such as lead, mercury, polychlorinated biphenyls, polyvinyl chloride, etc. [15]. There are also so-called “environmentally responsible” cryptocurrencies. For example, the BitSeeds cryptocurrency allocates 10% of BitSeeds issued to the Rainforest Fund to finance rainforest restoration [11]. Another example of “green” cryptocurrencies is SolarCoin, whose main goal is to stimulate solar-powered energy producers [1,16].

5

Solutions

As mentioned earlier, cryptocurrencies were designed as a new form of fiat money. However, technical difficulties stand in the way of their widespread adoption. The algorithmic difficulty of mining means that transaction speed in the network is limited by how quickly new blocks are created – while this is the defining feature of cryptocurrency decentralization, it also makes cryptocurrencies significantly less competitive compared to traditional electronic financial networks. The solution to this would be designing a novel algorithm for proving work (or a different kind of consensus algorithm) in a cryptocurrency network, which would be similarly secure while being less computationally expensive. Additionally, cryptocurrencies are extremely volatile assets due to a fixed supply coupled with a rapidly changing demand. This makes them questionable stores of value, and results in a (not unfounded) perception of cryptocurrencies as speculative assets. There is no single clear solution to this problem – specific kinds of cryptoassets require special approaches. For true cryptocurrencies,

Stability and Sustainability of Cryptotokens in the Digital Economy

493

so-called “stablecoins” attempt to solve the problem of volatility by pegging their value to a fiat currency using some kind of collateral as a stabilization mechanism. The economics of this approach are sound, but transparency and accountability are required to make them truly stable and legitimate in the eyes of governments. A less drastic solution for cryptocurrencies would be devising an algorithmic issuing body, which would attempt to balance supply against rising or falling demand; however, further research would be required into the economics of such an algorithm – as replacing the algorithm with human actors would simply revert the cryptocurrency back to a regular currency with a central bank. For cryptotokens issued by companies and other entities, volatility is similar to that of stocks and other market assets, and the solutions are similar as well. In addition to the above, cryptocurrencies are still in a legal grey zone, even if they are not banned in certain jurisdictions. A multitude of factors prevent their full legitimization – not the least of which are legislators’ ignorance and inertia. However, reasons also include a paradoxical lack of transparency and accountability in cryptocurrencies designed to be transparent and auditable. Because of the questionable legal status of cryptocurrencies, many mining operations operate clandestinely, or at least not fully openly. This has two manifestations: 1. Malicious actors perform illicit mining activities on the devices of unsuspecting users and companies. 2. Miners in general use powerful computing equipment for mining, which results in unexpected stress on power grids. Because of the decentralized nature of cryptocurrencies, punitive measures against the former problem on an institutional level are unlikely to be effective. However, technical measures, such as blacklists and signature-based detection, are effective in deterring cryptojacking. Automated control and monitoring systems for electricity – smart power grids – are promising candidates for alleviating the latter problem, especially coupled with internet-of-things-powered edge systems that feed into smart municipal information systems. This kind of data-driven infrastructure would be able to determine abnormal electricity consumption patterns and inform monitoring authorities almost immediately. The advent of 5G communications means it is possible for this infrastructure to communicate in real time, without appreciable delays between the information being gathered at the edge and being received for processing by a central information system, and even makes it possible for a smart power grid to regulate power supply to problematic areas itself, given a high enough level of integration. Additionally, cryptocurrency mining hot-spots are often literal hot spots: mining operations can produce significant heat, which may also be detected as part of municipal smart infrastructure. Satellite-based monitoring and imaging systems as part of a GIS may be especially useful here. One approach to managing the stress placed on the environment by cryptocurrency mining operations may be the introduction of mandatory registration

494

N. V. Apatova et al.

of all mining farms and a special “green” tax in regions where electricity used for cryptocurrency mining is produced primarily by coal power plants. This tax can simultaneously make it possible to finance development of the renewable energy sector in a given region and minimize the difference in the cost of mining between regions that produce electricity from coal and regions that use alternative power sources. To introduce this tax, it would be necessary to develop an appropriate regulatory framework, approve the tax base and its rate, and introduce punitive measures for those who do not pay this tax. Taxpayers would be monitored by state tax authorities, and the function of verifying the correctness of information reported by the miners would be delegated to energy companies. The use of heat generated during the operation of mining farms in heating systems and for growing agricultural products in greenhouses may also help minimize environmental impact. In the context of a smart city, cryptocurrency mining operations may be integrated into the infrastructure. For example, the waste heat generated by cryptocurrency mining equipment could be used as auxiliary source of heat at a municipal heating plant. The integration could be taken a step further if the tokens being mined were not simply commercial means of exchange like Bitcoin, but had a higher associated social benefit and carried some utility in the context of a smart city, e.g. were a means for consumers to pay for utilities (even the same electricity and heating) – in this case, the cryptocurrency becomes more than simply a currency, and “cryptotokens” becomes a more fitting name.

6

Conclusion

Cryptocurrencies are an interesting and potentially transformative development in financial virtualisation, brought about by the advent of digital economy. They have the potential to create a wholly new mode of trust between participants in the financial system, cutting out trusted third parties and intermediaries, like banks and exchanges, that society has come to rely on. However, this new phenomenon is not without its drawbacks. Firstly, technical and theoretical challenges, and the widespread speculative applications of cryptocurrency tokens that are precipitated by them, mean that much of their use today lies outside of socially beneficial fields. Secondly, the imposed artificial scarcity of these tokens means that creation of new tokens necessitates “mining” operations – computationally expensive operations, often performed on specialised hardware; these mining operations have undesirable consequences, like extremely high energy consumption (with associated carbon emissions) and significant waste heat production. The authors propose several solutions to these problems. To combat cryptocurrency volatility and inadequacy as money, further research into their technical and theoretical (economic) aspects is necessary, with the end goal of transforming existing algorithms and cryptocurrency economic theory to better serve the needs of a wider population of consumers.

Stability and Sustainability of Cryptotokens in the Digital Economy

495

From an ecological point of view, preventing excessive stress on municipal power grids is possible by means of IoT sensors and smart energy grids, reporting and potentially even correcting issues autonomously. A special tax, given an adequate tax rate and a clear system of control over the activities of miners will minimize the negative consequences of cryptocurrency mining. Prohibitive measures, on the contrary, will not lead to positive results, and may also lead to the popularization of shadow mining and slow the development of the emerging cryptocurrency market. The waste heat produced by cryptomining can also be repurposed in the context of a smart city: the waste heat may be used for municipal heating, and the cryptotokens being mined can be integrated into the smart city as a means of payment for utilities and other goods and services within the city. However, in the long-term, the only solution that remains viable is one that combines transformation of economic theory with a dramatic increase in performance and power efficiency of cryptotoken systems, in order to make them competitive with existing electronic financial infrastructure.

References 1. Andoni, M., et al.: Blockchain technology in the energy sector: a systematic review of challenges and opportunities. Renew. Sustain. Energy Rev. 100, 143–174 (2019) 2. Blockchain.info: Hashrate distribution: An estimation of hashrate distribution amongst the largest mining pools (2020). https://blockchain.info/pools 3. Coinmarketcap: Bitcoin price, charts, market cap, and other metrics (2020). https://coinmarketcap.com/currencies/bitcoin/ 4. Digiconomist: Bitcoin energy consumption index (2020). https://digiconomist.net/ bitcoin-energy-consumption 5. Goh, B., John, A.: China wants to ban bitcoin mining (2010). https://www. reuters.com/article/us-china-cryptocurrency/china-wants-to-ban-bitcoin-miningidUSKCN1RL0C4 6. Hayes, A.S.: Cryptocurrency value formation: an empirical study leading to a cost of production model for valuing bitcoin. Telematics Inf. 34(7), 1308–1321 (2017). https://doi.org/10.1016/j.tele.2016.05.005, http://www.sciencedirect.com/ science/article/pii/S0736585315301118 7. Hong, G., et al.: How you get shot in the back: a systematical study about cryptojacking in the real world. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1701–1713 (2018) 8. Karl, J.O., Malone, D.: Bitcoin mining and its energy footprint. In: Proceedings of the 25th Joint IET Irish Signals and Systems Conference 2014 and 2014 ChinaIreland International Conference on Information and Communications Technologies, pp. 280–285 (2014) 9. Kawase, Y., Kasahara, S.: Transaction-confirmation time for bitcoin: a queueing analytical approach to blockchain mechanism. In: Yue, W., Li, Q.-L., Jin, S., Ma, Z. (eds.) QTNA 2017. LNCS, vol. 10591, pp. 75–88. Springer, Cham (2017). https:// doi.org/10.1007/978-3-319-68520-5_5 10. Li, Z., Liao, Q.: Toward socially optimal bitcoin mining. In: 2018 5th International Conference on Information Science and Control Engineering (ICISCE), pp. 582– 586 (2018)

496

N. V. Apatova et al.

11. Lia, J., Lia, N., Peng, J., Cuia, H., Wua, Z.: Energy consumption of cryptocurrency mining: a study of electricity consumption in mining cryptocurrencies. Energy 168, 160–168 (2019) 12. Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008). http:// bitcoin.org/bitcoin.pdf 13. Palacio, N.S.: A technological tool for sustainable development or a massive energy consumption network. Bionatura, 3(4) (2018). http://revistabionatura.com/2018. 03.04.11.html 14. Ravindran, S., Ragoonanan, G.: Network virtualization is key to thriving in the digital economy (2015). https://www.telecomasia.net/content/networkvirtualization-key-thriving-digital-economy 15. Scott, R.: The e-waste stream in the world-system. J. Globalization Stud. 3(1), 79–94 (2012) 16. Solarcoin: Incentivizing a solar-powered planet (2020). https://solarcoin.org 17. de Vries, A.: Bitcoin’s growing energy problem. Joule 2(5), 801–805 (2018)

Identification System Model for Energy-Efficient Long Range Mesh Network Based on Digital Object Architecture Dmitriy Sazonov(B)

and Ruslan Kirichek

The Bonch -Bruevich Saint-Petersburg State University of Telecommunications, 22 Prospekt Bolshevikov, 193232, St. Petersburg, Russian Federation [email protected]

Abstract. The analysis of the possibility of building a system for identifying Internet of Things devices based on the Digital Object Architecture in mesh networks is given. The basic principles of the LPWAN networks and mesh networks are described. A brief overview of Digital Object Architecture technology is given. Schemes for integration of the Digital Object Architecture platform into mesh network are proposed. Various configuration options for this system in order to increase productivity are considered. The model of the Handle resolution system for identifiers of digital objects in mesh networks as a queuing system is proposed. An analysis of the results is given. Keywords: Internet of Things · Mesh networks · LPWAN · LoRaWAN · Digital object architecture · Handle system · Identification

1

Introduction

The rapid growth of the Internet of Things (IoT) technology has led to the proportional growth of the market for various applications that use this concept. The most popular areas are the following [1–4]: – augmented reality applications; – smart home applications; – smart cities application. For IoT applications, power consumption, low latency, edge device density, and communication security are important parameters [2,4]. One of the answers to these requirements for new generation networks was the creation of the concept of energy-efficient long-range networks (LPWAN). The publication has been prepared with the support of the grant from the President of the Russian Federation for state support of leading scientific schools of the Russian Federation according to the research project NSh-2604.2020.9. c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 497–509, 2020. https://doi.org/10.1007/978-3-030-66242-4_39

498

D. Sazonov and R. Kirichek

LPWAN is a specification that allows Internet of Things devices to communicate and transmit data over significant distances (kilometers) with low power consumption [5,6]. However, LPWAN has a low data rate. One of the implementation of the LPWAN concept is LoRaWAN technology. LoRaWAN based on LoRa modulation technology (Long Range) at the physical level [7–9]. LoRaWAN protocol provides a significant coverage area compared to analogs. Based on the use of LoRa technology at the physical level, the LoRaWAN protocol created and maintained by the LoRa Alliance [5,7]. LoRaWAN solutions based on star or star-of-stars topology, where edge devices interact through multiple gateways with the base network server [10–12]. Figure 1 shows a basic LoRaWAN network topology.

Fig. 1. LoRaWAN topology

Besides LPWAN concept and LoRaWAN technology there are many IoT solutions based on mesh topology [10,12,13]. Figure 2 shows basic mesh topology.

Fig. 2. Mesh topology

Identification System for Mesh Networks Based on DOA

499

Features of mesh topology based networks: – traffic control algorithms (for choosing the optimal route); – route adaptation; – self-organization and self-healing. Popular technologies based on mesh topology are: ZigBee, Thread, 6LowPAN, Z-Wave and Bluetooth Low Energy 5.0 protocols. And LoRa technology allows you to increase the coverage of such networks [11,12]. A key feature of the mesh topology compared with the star topology or starof-stars topology of LoRaWAN is the resilience of the network to the failure of individual components [12–14]. In this case, routing will adapt to the new structure and the transmission will not be interrupted. In the star topology, when the central hub (network server) fails, the network falls apart. One of the possible solution to this problem is the switching from the star topology to mesh topology for LoRa-based applications. This gives us the possibility to achieve the fault tolerance of mesh topology and low power consumption and long distance transmitting of LoRaWAN. The idea of organization low power long range mesh networks was considered in [11,12]. This articles presented a model showing the possibility of organizing LoRaWAN devices in a mesh topology. In our work, we will focus on the problem of identifying edge devices in such hybrid network.

2

Identification Approaches in LoRa and Mesh Networks

In networks based on mesh topology each node can send and receive data. Nodes in mesh networks are divided into several types [12,13]: – edge device; – gateway (have a connection to an external network); – network configurator (individual node, that manage network structure). Configurators are responsible for assigning addresses in the mesh network and monitoring the overall status of the network. Typically, device addresses are combined with their unique identifiers in mesh networks, i.e., those unique descriptors that are integrated into devices during the configuration phase of the entire network subsequently serve as addresses in the network when implementing hop forwarding messages between nodes. LPWAN based solutions also have their own identification system. For example, in LoRaWAN networks, each edge device has the following set of identification information [7–9]: – AppEUI; – DevAddr; – DevEUI.

500

D. Sazonov and R. Kirichek

There is no standard for implementing an identification system for IoT networks only recommendations and custom vendor implementations (e.g. LoRaWAN and its DevEUI addresses). To implement identification system for a mesh networks for LoRa-based applications, it will be reasonable to use technology that would allow to use the existing approaches to identification in LoRaWAN and mesh networks and integrating them as part of own identification platform. The aim of this work is to analyze the possibility of using the Digital Object Architecture as a platform for implementing an identification system for Internet of Things devices in such LoRa-based mesh networks.

3 3.1

DOA Based Identification Digital Object Architecture

DOA technology was created by Corporation for National Research Initiatives CNRI two decades ago [15–17]. Digital Object Architecture has proven itself worldwide as a system for identifying academic, professional and government information: it is the well-known DOI identifiers of articles and book publications [17–20]. The main structural elements of DOA are a digital object, digital object registry and repository and resolution system [16,18,19]. The digital object provides various information about the object it represents: information about the author, access requirements authentication, etc. [19,20]. DOA also provides a special subsystem for the management and administration of digital objects. Digital object registries and repositories are metadata storages for searching and resolving unique identifiers into digital object data. Resolution System is a subsystem that allows to resolve unique identifiers into specific digital information. The concrete implementation of digital object architecture is the Handle System [16,19]. The Handle system is based on distributed network of locally administered databases (LHR) connected through global handle registries (GHR). Distributed system allows flexible configuration and management of the infrastructure, increases the fault tolerance [19–21]. The Handle system also include administration subsystem, handle resolutions subsystem and an user authentication and authorization subsystem. The classical Handle system based on two-level architecture [16,19,21]. The first level is the global handle registries. The second level is a layer of local handle registers. To resolve the handle identifier the client first sends a request to the GHR, which responds with information about the LHR that manages the required digital object. Figure 3 shows Handle System architecture.

Identification System for Mesh Networks Based on DOA

501

Fig. 3. Handle system architecture

3.2

DOA as Identification System

The International Telecommunication Union (ITU) has the following list of recommendations for identification systems for Internet of Things devices in narrowband wireless communication networks [22]: – the uniformity and constancy of the identifier of the digital object x (i.e., only one identifier must correspond to each device); – the system architecture should not limit the number of metadata objects that can be registered for a single device; – object metadata should contain both links to registers containing information about the device, and a copy of the information itself; – the possibility of interoperability between different resolution systems should be ensured; – architecture of the system should be scalable; – the system should be widely available and form the basis of an open resolution system architecture; – structures describing meta information about a digital object should be extensible to provide flexible adaptation of the system to the changing requirements of end customers; – the system should include administration mechanisms; – authentication/authorization processes in the system should use certificates, electronic signatures or public key cryptographic systems; – certificates, electronic signatures or keys should be certified by a higher authority with a high degree of trust; – authorization data supporting the processes of management and interaction with digital objects are also stored as digital objects. DOA technology provides a common approach to digital information management both on the Internet and other networks. It uses protocols that work on top of the classic IP networks [18,20].

502

D. Sazonov and R. Kirichek

DOA is based on the same basic principles that are embedded in the architecture of the modern Internet, which determined its success and the ability to evolve over a significant period of time [15,19,20]: – open architecture (include protocols and interaction interfaces); – independence from specific implementation technologies; – minimizing complexity for the end user. DOA technology has the following key characteristics that make it suitable for the implementing an identification system for IoT devices [16,18,20]: – persistent unique identifier. The identifier does not contain dynamic information about the object. All information is stored in a digital object, the identifier only refers to it; – universality - DOA system identifier allows you to identify not only physical objects, but also digital entities; – DOA is based on distributed platform with different administration schemes at the local and global levels; – network scalability; – flexible digital object administration; – high safety. Identification systems based on DOA concept contains information about the class of the object, the subsystem of working with the object and the method of protection and access to data. Such systems allows you to build complex identification solutions, including interaction of various information systems within one system based on digital objects [19–21]. Handle system as a implementation of the DOA concept provides programming interface for clients (rest api) for managing records of digital objects and obtaining information (resolution) as well as a set of tools and libraries for writing custom applications [16,20]. It is possible to organize various schemes of client interaction with the Handle system to organize various identification scenarios for mesh networks. 3.3

DOA Based Identification for Mesh Networks

Consider the following architecture for identification system in a mesh network based on Handle System. The administrator (device owner) sends information about the IoT devices to the Handle System, providing the basic description and various metadata that will be required in the future to complete the identification process. In addition, it is possible to implement a role-based access model for devices, which can then be used at the stages of network configuration to split it into subnets. Next, the Handle System sends unique identifiers of the registered devices to the owner. Administrator flashes the identifiers to the device memory. When the devices starts to configure in a mesh network, identifiers are embedded in a message body from the edge devices and transmitted over the network.

Identification System for Mesh Networks Based on DOA

503

Fig. 4. Basic mesh network identification process

Through the gateway, such messages with identifiers are sent to the cloud for further processing and identification. In the Fig. 4, the described process is shown. Mesh subnet consisting of several edge devices and a gateway device (black). The authorization subsystem in the cloud processes the message flow, sends information to the Handle subsystem (or its local cache if it is already filled with previously processed identifiers) to obtain identification information. To speed up flow processing, authorization subsystem can be configured to periodically scan the message stream. After checking the authorization information, the data from edge device is sent to further processing. If the request is not authorized, messages from the device are rejected. The authorization subsystem can send a notification request to the network coordinator to block an unauthorized device. The subsystem also can send notification to the network administrator about the presence of an unauthorized device. Figure 5 shows the diagram of the system interaction with an unauthorized device. To analyze described process let us consider a queuing model of a identification system for a mesh network based on the DOA architecture.

504

D. Sazonov and R. Kirichek

Fig. 5. Unauthorized device filtering

4

Queuing Model of Identification System for Mesh Network

The queuing model is based on the model of the DOA system considered earlier in [12,19,21]. We introduce a couple of assumptions into our model to be able to simulate it and further analyze it. It is possible to represent a mesh network edge device in our model as a single entity with a buffer and a delay block. Figure 6 shows edge device model. The total latency of the transmission from the edge device to the processing server is defined as the product of the delay in one device by the number of hops. Within our model, we will consider the Handle System as a separate server consisting of a buffer and a delay block. Handle System block in queue system will be similar to edge device model on Fig. 6.

Identification System for Mesh Networks Based on DOA

505

Fig. 6. Edge device model

Figure 7 shows a described queuing model of identification system built in the AnyLogic package.

Fig. 7. AnyLogic model

AnyLogic model consists of the following components: – edgeDevice - single edge device of the mesh network, transmitting data through intermediate devices to the gateway and further to the cloud; – hopDevQueue and hopDev - model of intermediate edge devices (also include gateway). The number of devices in the chain is determined by the hopsNum parameter. In our model, it was 3 intermediate devices. HopDelay block in our model has the following parameters: capacity = hopsNum (each edge device in the mesh network usually can process one request at a time); processing time = hopsNum * avgDevDelay (where avgDevDelay is the average processing time of the request on the edge device, the value of 100 ms was selected in our model); – cloudQueue + cloud - model of remote server that process all incoming request from mesh network. The average processing time of one request in our model is 200 ms. Server in our model can handle 15 requests in parallel (we assume that the service processes requests in 15 threads);

506

D. Sazonov and R. Kirichek

– handleSysQueue + handleSys - model of the Handle System remote service that processes resolution requests from the cloud. The average processing time (with the network delay) is 400 ms; – needAuth - a switch block that control data flow that needed to resolve in Handle System. The time between incoming requests from edge device is distributed exponentially with load parameter a. In our model, it varies discretely from 1 to 200 with step 0.5. In this model we analyze several parameters: average processing time of the request from the edge device, the load of the Handle System and the total load of the identification system. In the described model we considered several configurations of the identification system: – every incoming request from the edge device will send to the Handle System; – the cloud server periodically switch to identification mode and start to send all incoming requests to the Handle System. Scan period is 10 min; – the cloud server switch to caching mode by adding all responses from Handle System to local cache which is then used to identify subsequent request. The cache lifetime in out model is 10 min. The following Figs. 8 and 9 show the results of the analysis of our model which was configured in different modes that was described previously. Figures characterize our model system according to the parameters of the average request processing time, the number of requests to the Handle System to the total number of requests (percentage). The simulation time was 100 min.

Fig. 8. Processing average time

From Fig. 8 it can be seen that when our model was process every incoming request with identification request to the Handle System, even at low load level

Identification System for Mesh Networks Based on DOA

507

(3 requests per second), the average processing time for requests is around 700 s. When model switched to the periodic scan mode with a period of 10 min, it showed performance improve (about 25 s). When our model worked with the cache with 10 min lifetime, it showed the best results (0.5 s).

Fig. 9. Handle System loading

The Fig. 9 shows the dependence of the rps load (requests per second) received by the Handle System from the total number of rps that incomes to our system. It can be seen that when working with the cache, the load level on the Handle System stay constant (4 devices, cache 10 min). In other configurations, the dependence is linear.

5

Conclusion

In this paper, the possibility of implementing a DOA-based identification system in a hybrid network of LoRa devices combined in mesh topology was considered. An attempt to move from the classic star topology, which is typical for LoRaWAN to mesh, is caused by the desire to solve the problem with a single point of failure, typical for the star topology, and move to a distributed mesh network topology, which has a number of advantages listed in this work. To build the identification system, the DOA platform was chosen, since it is quite promising, there are already solutions for identification based on DOA in other areas. In addition, the Digital Object Architecture as a platform meets the ITU recommendations for identification systems in narrow-band Internet of Things networks. Possible schemes of the identification system in the described mesh network are considered. To analyze the system performance, a queuing model was built in the AnyLogic package.

508

D. Sazonov and R. Kirichek

Even an analysis of the simple model shows that the implementation of an identification system based on the Handle System for mesh networks is possible. Handle System is a client-server type system, and interaction and integration of third-party systems with it can occur via http requests (rest api). Analysis of the described model shows that the operating mode of the identification system using the query cache shows the best performance. This operating mode of the system is possible, since device identifiers usually do not change throughout the life cycle of a system. As part of the development of the described concept in future work, it is planned to build a test mesh network system with DOA-based identification and analyze the configuration of the system.

References 1. Borodin, A., Kucheryavy, A.: Communication Networks of the fifth generation as the basis of the digital economy. Electrosvyaz 5, 45–49 (2017) 2. Kucheryavy, A., Prokopiev, A.: Self-Organizing Networks. Libavich, Saint Petersburg (2011) 3. Lea, P.: Internet of Things for Architects: Architecting IoT Solutions by Implementing Sensors, Communication Infrastructure, Edge Computing, Analytics, and Security. Packt Publishing, UK (2018) 4. Kucheryavy, A.: Internet of things. Elektrosvyaz 1, 21–24 (2013) 5. Kumaritova, D., Kirichek, R.: Review and comparative analysis of LPWAN network technologies. Inf. Technol. Telecommun. 4, 33–48 (2016) 6. Khutsoane, O., Isong, B., Abu-Mahfouz, A.: IoT devices applications based on lora/lorawan. In: IECON 2017–43rd Annual Conference of the IEEE Electronics Society, pp. 6107–6112 (2017) 7. History of LoRa technology. https://nekta.tech/en/technology/. Accessed 9 Sep 2020 8. Semtech Corporation. Sx1276/77/78/79 datasheet, rev. 6. Semtech Corporation (2019) 9. Semtech Corporation. SX1272/3/6/7/8 LoRa Modem Design Guide AN1200.13. Semtech Corporation (2013) 10. Nurilloev, I., Paramonov, A., Koucheryavy, A.: Connectivity estimation in wireless sensor networks. In: Galinina, O., Balandin, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART -2016. LNCS, vol. 9870, pp. 269–277. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-46301-8 22 11. Pham, V., Dinh, T., Kirichek, R.: Method for organizing mesh topology based on LoRa technology. In: 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), pp. 1–6 (2018) 12. Pham, V., Gallyamov, D., Vorozheykina, O., Kitichek, R.: Model of energy-efficient long range mesh network. Elektrosvyaz 5, 33–41 (2020) 13. Wireless Mesh Network - A well proven alternative to LPWAN. https://www. eot.dk/Files/Images/Elektronikmesse/2017/Konferencerne/Pre-fra-SPEAKERE/ Wireless-Mesh-Network-a-well-proven-alternative-to-LPWAN.pdf. Accessed 9 Sep 2020 14. Difference Between Star and Mesh Topology. https://techdifferences.com/ difference-between-star-and-mesh-topology.html. Accessed 9 Sep 2020

Identification System for Mesh Networks Based on DOA

509

15. Kahn, R.E.: A framework for distributed digital object services. Int. J. Digit. Libr. 6, 115–123 (2006) 16. The Handle System. https://www.dona.net/handle-system. Accessed 9 Sep 2020 17. Al-Bahri, M., Yankovsky, A., Borodin, A., Kirichek, R.: Testbed for identify IoT-devices based on digital object architecture. In: Galinina, O., Andreev, S., Balandin, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART -2018. LNCS, vol. 11118, pp. 129–137. Springer, Cham (2018). https://doi.org/10.1007/978-3-03001168-0 12 18. Digital Object Protocol Specification, version 1.0, CNRI. https://www.dona.net/ doipv1doc. Accessed 9 Sep 2020 19. Kirichek, R., Sazonov, D.: Digital object architecture as an approach to identifying internet of things devices. Distrib. Comput. Commun. Networks, 597–611 (2019) 20. Borodin, A., et al.: Identification of devices and systems of narrowband wireless networks of the Internet of things. Part I. lektrosvyaz 5, 24–33 (2020) 21. Al-Bahri, M., Kirichek, R., Sazonov, D.: Modeling of the Internet of things device identification system based on the architecture of digital objects. Proc. Educ. Inst. Commun. 1, 42–47 (2019) 22. Recommendation X.660 (07/11) X.660 : Information technology - Procedures for the operation of object identifier registration authorities: General procedures and top arcs of the international object identifier tree. https://www.itu.int/rec/TREC-X.660-201107-I/en. Accessed 9 Sep 2020

Efficient Wireless Data Collection System Based on LoRaWAN Technology and Distributed Computation Approach Yury Rassadin(B)

and Sergey Dushin

Trapeznikov Institute of Control Sciences, Profsoyuznaya 65, 117997 Moscow, Russia [email protected] https://energy.ipu.ru/

Abstract. In the paper a way to build a wireless sensor network based on LoRaWAN technology is considered. The proposed approach allows to increase the intensity of data collection compared to standard implementations of LoRaWAN network and save energy efficiency of wireless sensors. The main feature of the network is the edge computing algorithm of distributed data compression. The algorithm is based on controlling prediction error on the end device side. The prediction is completed by recursive linear prediction algorithm on the server side. Higher data collection rates are achieved along with acceptable level of energy efficiency for autonomous operation of sensors and low load of the physical communication channel. The effectiveness of the proposed solution can be illustrated by the results of simulation experiments and the network of temperature sensors for intensive temperature measurement in the problem of identifying the topology of the office building heating system. The network is based on open source software, ChirpStack server, LoRaWAN end-device stack from Semtech and additional modules developed by the authors. Keywords: Wireless sensor network LoRaWAN · Edge computing · IoT

1

· High-intensity data collection ·

Introduction

Sometimes it seems that modern technologies have touched all areas of our life. The stronger is the contrast with the real level of technological equipment of the majority of buildings in operation today – introduction of modern automation and intelligent control technologies in old buildings is a very laborious and time-consuming problem. For buildings from XXth century automatization of energy systems, heating and climatic systems is related with various difficulties due to the fact that the necessary functionality was not provided at the design stage. In this paper we consider an approach to the design and deployment of a sensor network that allows to apply existing smart building techniques in poorly adapted areas. Our approach also provides a perspective for improving this class c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 510–520, 2020. https://doi.org/10.1007/978-3-030-66242-4_40

Data Collection Based on LoRaWAN and Distributed Computation

511

of methods by increasing the frequency of measurements. Our development was based on accessible hardware elements and open source software for maximum reproducible results. Typical problems that affects the smart building efficiency are the power supply for sensors, availability of data cables, direct access to key building objects. The exact schemes of the facilities are often missing, and the maintenance is held under conditions of uncertainty and varying parameters. Wireless autonomous sensors are most likely non-alternative when connection to reliable power networks is lacking and cable infrastructure of the communication network is absent. Energy efficiency for this king of sensors is very important, so the use of highspeed wireless technologies, such as IEEE 802.11 (Wi-Fi) standards family, is most likely excluded. There are available solutions based on modern wireless LAN technologies, such as LoRaWAN, SigFox and NB-IoT [1–3]. They solve typical problems of data collection and equipment management quite effectively [4]. A common disadvantage of this kind of technologies for building wireless sensor network is the low bandwidth of the wireless channels used and the intensity of data exchange limitations for keeping the sensors battery life at an acceptable level [4,5]. The software methods of saving power for wireless sensors are the subject of recent works [6,7]. At the same time in real IoT applications it is often necessary to collect much more data than LPWAN technologies provide and currently there is scientific interest in such problems [8–10]. An interesting example of this problem is the high frequency temperature measurement of heat pipes that is necessary for identification of the building’s heating system topology. To register temperature waves a measuring and registration system with a frequency of at 1 Hz is required. In the paper we propose a method for providing high-intensity data collection from wireless autonomous sensors, which solves the problem of intensive temperature measurement and can be used for identifying the topology of the building’s heating subsystem, as well as in a variety of other applications that require intensive data collection by wireless sensors. The paper is organized as follows. The second section describes the main idea of the work, the data compression algorithm for communication between peripherals and the central server, which allows to increase the polling frequency of LoRa channel. The third part describes the network architecture, server side, and software for end devices. The fourth section deals with network deployment issues, hardware lists and areas for further research. The fifth section is about simulation experiment that was held to estimate the effectiveness of proposed approach. The sixth section discusses some areas for further research.

2

The Intensive Data Collection Method

The authors take part in the development of the Center of Digital Solutions for Smart Grid [11]. For one of the sub-tasks of the Center, a system is required that is able to register the temperature wave spreading with a data collection frequency determined by the heat wave speed, in our case 1 Hz. The idea is

512

Y. Rassadin and S. Dushin

to identify the topology of the heat network by creating a heat wave using the heat node control devices. Data on the each node temperature variations, synchronized in time, will be processed by profile specialists in the future. 2.1

Client-Server Interconnection Logic

The data compression algorithms are powerful and commonly used tools for increasing the amount of data transmitted through the communication channels and optimizing power consumption in communication networks [12–14]. However the use of traditional compression in LPWAN networks leads to unacceptable increases in data latency and power consumption on the sensor side as additional data processing is required. An interesting works toward to data compression in LPWAN can be found in [15–18]. This is why the information is transmitted in uncompressed form and the development of such algorithms for LPWAN must take into account the requirements and specific conditions of these networks. The essence of the proposed approach is synchronous prediction of the input signal both on the server side and on the sensor side [7]. In this case, information from the sensor is sent when the prediction error exceeds the predefined threshold. This new measurement is used to correct the prediction on the server side. If the sensor is silent, the server decides that the prediction is accurate enough and uses it as real-time information. Prediction procedure uses linear algorithm [19] that is based on the Levinson-Durbin recursion. It is also important that the predictor filter coefficients [20,21] are calculated on the server side to save battery budget. They are transmitted to the sensor only if the error threshold value is exceeded. This algorithm is schematically shown in the Fig. 1. Under these conditions the use of a physical transmitter is minimized (the most energy consuming functional part of an autonomous sensor). The server uses its input estimation as real-time data until corrective information from the sensor is received. 2.2

Data Prediction Method

To describe the math side of algorithm let consider linear prediction technique [20]. The idea of linear prediction is to represent current sample as a linear combination of past samples (1). x ˆ(i) =

N 

an ∗ x(i − n)

(1)

n=1

The formula (1) describes the convolution of N past samples of observed process and coefficients an . The coefficients can be considered as taps of finite impulse response filter, which is called filter-predictor. The optimal coefficients of predictor in terms of minimizing MSE (means squire error) can be found to solve Yule-Walker Eq. (2).

Data Collection Based on LoRaWAN and Distributed Computation

513

Fig. 1. Distributed data compression algorithm for LPWAN



R0 R2 .. .

⎜ ⎜ ⎜ ⎝ RN −1

⎛ ⎞ ⎛ ⎞ ⎞ a1 R1 R1 · · · RN −1 ⎜ ⎟ ⎜ R2 ⎟ R0 · · · RN −2 ⎟ ⎜ ⎟ ⎜ a2 ⎟ ⎟ .. . . .. ⎟ ∗ ⎜ .. ⎟ = − ⎜ .. ⎟ ⎝ . ⎠ . . ⎠ ⎝ . ⎠ . RN −2 · · · R0 aN RN

(2)

where Rn - autocorrelation function of the estimated process, an - filter predictor coefficients. Traditional methods of solving Yule-Walker equation have computational complexity O(N 3 ). However, the autocorrelation matrix is Toeplitz matrix, so the fast computational algorithm called Levinson-Durbin recursion can be used [21]. This algorithm provides computational complexity O(N 2 ). The main idea of Levinson-Durbin recursion is to solve Yule-Walker equation by blocks increasing of order equation from 1 to N. The generalized form of the recursion for arbitrary order n + 1 [22] described by formulas (3)–(6). kn+1 =

αn , en

(3)

An+1 (z) = An (z) + kn+1 ∗ z −1 ∗ [z −n ∗ An (z)],

(4)

en+1 = [1 − |kn+1 |2 ] ∗ en ,

(5)

514

Y. Rassadin and S. Dushin

αn = Rn+1 + an,1 ∗ Rn + an,2 ∗ Rn−1 + .... + an,n ∗ R1 ,

(6)

where en - error prediction, kn+1 - reflection coefficient, An (z) - filter predictor response. To do Levinson-Dusrbin recursion we are need to estimate the autocorrelation function. It can be calculated recursively updating previous values by new samples to reduce the computational complexity [21]. Of course, a possible long term non-stationarity of estimated process should be taken in account. There are two main ways to do this: introducing the forgetting factor or calculate the autocorrelation function within a window. The second one is used for proposed algorithm. To keep the network payload and transmitter active time as small as possible, it is necessary to minimize the data size within packets, which sends by end device to server. Since the estimated samples is accepted as well-predicted while end device keeps silence, the server can use these estimated values to update the filter predictor coefficients on the next iteration. Taken this in account only last measured sample (poorly predicted) can be transmitted to server. Moreover the end device can transmit only prediction error, as the actual value can be calculated by the server using simple formula (7). x(i) = x ˆ(i) + ei

3

(7)

System Architecture

Same as the standard LoRaWAN network architecture [1], the modified system has server and client sides. The main functional blocks are shown in the Fig. 2. The server part consists of standard LoraWAN components (network bridge, network server, application server) and additional modules that provide information compression, improve sensor energy efficiency and channel utilization efficiency. At each time interval the sampling module implements the measurement prediction if the data from the sensor did not come or transfer the data directly if it was received from the sensor. If data is received from the sensor, which means that specified error threshold is exceeded, the module for recalculating the predictor filter coefficients generates new coefficient values according to the Levenson-Durbin algorithm. The Transmission Control Module sends predictor filter coefficients to the sensor and receives and processes packets from the sensor. The physical and channel levels required for LoRaWAN as well as additional modules are implemented on the sensor side. The prediction module estimates input value using a formula identical to the server one. The predicted value is then compared to the result of real measurements. The measurement module has quite common design. Since NTC thermistors change their characteristic nonlinearly, the temperature values are stored as a tabular function. We use binary search in this table, intermediate values are calculated linearly, t(r) = t1 + (t2 − t1 )(r − r1 )/(r2 − r1 ). The resistance corresponding to the temperature

Data Collection Based on LoRaWAN and Distributed Computation

515

Fig. 2. Modified LoRaWAN network structure

of 25 ◦ C is used as the zero iteration. The control module provides transmitting data if the prediction error [7] is greater than the predefined threshold, as well as receiving predictor filter coefficients from the server and updating them.

4

Intensive Temperature Measurement of the Building Heat Pipes

The process of deploying the described network can be divided into three stages. The first stage was the choice of equipment capable of solving the problems faced by the authors. The second stage was to create software for end devices and for the server part, testing and debugging their interaction. The third and final stage should include work on the deployment of the network in a particular building: scaling the results of the second stage on the entire building, providing reliable coverage by gateways, testing launches. The required equipment list contains temperature sensors, server, gateways and network infrastructure for them. We use a virtual machine with OpenSUSE operating system as central node. The gateways were chosen to comply with Russian regional standards. An affordable solution is the MikroTik R11e-LR8 gateway based on the Semtech SX1301 processor. During the development process, we also used the Vega BS-1 gateway, which will be integrated into the

516

Y. Rassadin and S. Dushin

working network later. The temperature sensor is controlled by the STM32L151 [23] microcontroller, which is declared by Semtech to be energy efficient. The choice of the LoRa transmitter manufacturer is obvious, we opted for Semtech SX1272 [24]. The temperature measuring module is a voltage divider with a NTC thermistor B57861. A battery with a voltage of 3.3–5 V (in our case, 3.6V) can be used for power supply. 4.1

Server Side

To build the server part, the open software package ChirpStack [25] was used, the computational module of the compression algorithm is implemented by means of the provided API. We use Python programming language to implement the predictor filter, as well as the WebSocket client and server. We placed the ChirpStack gateway bridge, network server and application server components on the central server machine in order to shift the main computing load onto it in accordance with the main idea of work. 4.2

End Device Side

For creating the client firmware we used the Semtech development environment and open-source libraries. The Semtech company gives full freedom to developers, including the commercial use of the results. Sensor firmware development was implemented in C language in the ac6 System Workbench for STM32 IDE environment on the basis of the LoRaWAN end device stack open project. Energy efficiency is achieved not only by reducing the number of data transmission sessions, but also by controlling power supply to peripheral devices. The SX1272 modem is capable of independently controlling the high-frequency transmitter module, but we decided to control it directly from the microcontroller maximize energy savings. 4.3

Equipment Layout

There should be two types of devices distributed throughout the building, sensors and gateways. The LoRaWAN protocol allows great freedom and convenience in the arrangement of end devices, so in the paper we consider the placement of sensors to depend on the specific problem. In the case of identification of the heating system, the sensors should be located in various rooms on the heating pipes mainly near the windows. The LoRaWAN Protocol has a mechanism for managing multiple gateways connected to a single network server, so the most difficult problem when deploying such a network is to find an optimal nonexcess location of the gateways. The building where the experimental network was deployed is elongated, so we decided to place the base stations near the windows, covering the extended facades of the building separately. We have placed an additional base station in the basement of the building for coverage of the main nodes there.

Data Collection Based on LoRaWAN and Distributed Computation

5

517

Simulation

Matlab/Simulink models of server side and sensor side where built to estimate the proposed method efficiency [7]. The real data collected by sensor network deployed in Institute of control science of RAS is used during experiments. In particular, it is data from intrabuilding humidity and light sensors collected during two weeks. The actual collected data and its estimation on server side for humidity sensor are presented on Fig. 3. The same for light sensor is presented of Fig. 4. On the figures the original data is drawn by solid lines, the estimation one is drawn by dotted lines. Original Signal vs. Estimation 50 Original Signal Estimation 45

40

Amplitude

35

30

25

20

15

10 1000

1500

2000

2500 Sample Number

3000

3500

4000

Fig. 3. Actual data of humidity sensor and its estimation on server side

In experiments, which results is shown on Figs. 3 and 4, the data were predicted by filter predictor with order of 5 and data window of 100 [7] and maximum prediction error was 5%. As can be seen from features, for both signals the original data can be well enough predicted during several time slots from resent original data arrivals. Although, the prediction error increases during prediction time without data updating from sensor side. The average data compression ration during experiments time is 8.4 for humidity sensor data and 6.5 for light sensor data.

518

Y. Rassadin and S. Dushin Original Signal vs. Estimation 500 Original Signal Estimation

400

Amplitude

300

200

100

0

-100 1000

1500

2000

2500 Sample Number

3000

3500

4000

Fig. 4. Actual data of light sensor and its estimation on server side

6

Results and Further Research Area

Intensive data collection from small groups of sensors has been implemented and tested for today. The next step is to develop a guaranteed method to scale such segments to the required size. We want to orientate ourselves to the volumes declared in the LPWAN brochures, several hundreds of sensors simultaneously. Using open source software from ChirpStack and Semtech, we are able to bypass the limitations on sensor polling frequency that are inherent to commercial solutions, and the network is still evolving. One of the directions of development can be improvement of prediction algorithms using mathematical models of monitored objects. For some experiments the central server capacity may not be enough, so the server site can be transferred to a more powerful machine, but so far this has not been necessary. We hope that a deeper study of server software from ChirpStack will help us to optimize the proposed approaches.

7

Conclusion

A modified architecture of wireless sensor network is presented in the paper, which allows to increase the intensity of data collection in comparison with standard implementations of LoRaWAN networks. The main functional feature of the network is the use of the authors’ algorithm for distributed data compression in LPWAN networks. The proposed approach achieves the main goal in terms of intensity while energy efficiency stays at an acceptable level for autonomous operation of sensors and load of the physical communication channel remains

Data Collection Based on LoRaWAN and Distributed Computation

519

low. The algorithm involves prediction of input data on the server side, while the sensor only transmits corrective information in case of exceeding the predefined prediction error. This approach minimizes the use of standalone sensors and reduces the load on the physical communication channel. Lower power consumption allows to extend sensors lifetime until the batteries are replaced. The authors’ contribution to network software development is at the level of server applications and sensor firmware of the devices. The effectiveness of the proposed approach will be investigated when solving the problem of intensive data collection of temperature sensors in the identification of the topology of the heating system of an office building.

References 1. Mekki, K., Bajic, E., Chaxel, F., Meyer, F.: Overview of cellular LPWAN technologies for IoT deployment: Sigfox, LoRaWAN, and NB-IoT. In: 2nd IEEE International Workshop on Mobile and Pervasive Internet of Things - Athens (2018) 2. Ayoub, W., Mroue, M., Nouvel, F., Samhat, A.E., Prevotet, J.: Towards IP over LPWANs technologies: LoRaWAN, DASH7, NB-IoT. In: 2018 Sixth International Conference on Digital Information, Networking, and Wireless Communications (DINWC) (2018). https://doi.org/10.1109/dinwc.2018.8356993 3. Jovanovi´c, M.L., Koprivica, M., Neˇskovi, N.: Implementation of IoT system for securing telecommunications infrastructure based on LoRaWAN operator’s network. In: IEEE EUROCON 2019–18th International Conference on Smart Technologies, Novi Sad, Serbia, pp. 1–6 (2019). https://doi.org/10.1109/EUROCON. 2019.8861632 4. Bazenkov, N.I., et al.: Intensive data collection system for smart grid and smart building research. In: 2019 1st International Conference on Control Systems, Mathematical Modelling, Automation and Energy Efficiency (SUMMA), Lipetsk, Russia, pp. 411–415 (2019) 5. Pukrongta, N., Kumkhet, B.: The relation of LoRaWAN efficiency with energy consumption of sensor node. In: 2019 International Conference on Power, Energy and Innovations (ICPEI), Pattaya, Chonburi, Thailand, pp. 90–93 (2019) 6. Sacaleanu, D.I., Pericoara, L.A., Stoian, R., Lzarescu, V.: A new energy saving framework for long lasting wireless sensor nodes. In: 2015 7th International Conference on New Technologies, Mobility and Security (NTMS) (2015). https://doi. org/10.1109/ntms.2015.7266467 7. Dushin, S.V., Frolov, S.A.: Distributed data compression algorithm for low-power wide-area networks. In: Vishnevskiy, V.M., Samouylov, K.E., Kozyrev, D.V. (eds.) DCCN 2019. CCIS, vol. 1141, pp. 163–173. Springer, Cham (2019). https://doi. org/10.1007/978-3-030-36625-4 14 8. Benninger, S., Magno, M., Gomez, A., Benini, L: EdgeEye: a long-range energyefficient vision node for long-term edge computing. In: Tenth International Green and Sustainable Computing Conference (IGSC), Alexandria, VA, USA, 2019, pp. 1–8 (2019) 9. Van den Abeele, F., Haxhibeqiri, J., Moerman, I., Hoebeke, J.: Scalability analysis of large-scale LoRaWAN networks in ns-3. IEEE Internet Things J. 4(6), 2186– 2198 (2017). https://doi.org/10.1109/JIOT.2017.2768498

520

Y. Rassadin and S. Dushin

10. Wu, Y., He, Y., Shi, L.: Energy-saving measurement in LoRaWAN based wireless sensor networks by using compressed sensing. IEEE Access 8, 49477–49486 (2020). https://doi.org/10.1109/ACCESS.2020.2974879 11. Official cite of the center of digital solutions for smart grid. https://energy.ipu.ru/ 12. Gibson, J.: Information Theory and Rate Distortion Theory for Communications and Compression. Morgan & Claypool, San Rafael (2013) 13. Helman, D.R., Langdon, G.G.: Data compression. IEEE Potentials 7(1), 25–28 (1988). https://doi.org/10.1109/45.1889 14. Hanzo, L., Somerville, F.C.A., Woodward, J.P.: Speech signals and an introduction to speech coding. In: Hanzo, L., Somerville, F.C.A., Woodard, J., (eds.) Voice and Audio Compression for Wireless Communications. Wiley, Hoboken, pp. 1–28 (2007). https://doi.org/10.1002/9780470516034.ch1 15. Jang, Y.S., Usman, M.R., Usman, M.A., Shin, S.Y.: Swapped Huffman tree coding application for low-power wide-area network (LPWAN). In: 2016 International Conference on Smart Green Technology in Electrical and Information Systems (ICSGTEIS), Bali, pp. 53–58 (2016). https://doi.org/10.1109/ICSGTEIS.2016. 7885766 16. Abdelfadeel, K.Q., Cionca, V., Pesch, D.: Dynamic context for static context header compression in LPWANs. In: 2018 14th International Conference on Distributed Computing in Sensor Systems (DCOSS), New York, NY, pp. 35–42 (2018). https://doi.org/10.1109/DCOSS.2018.00013 17. Pongpunpurt, P., Khawsuk, W., Sutthisangiam, N.: Development of Huffman code for Lora technology. In: IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI). Leicester, United Kingdom, 2019, pp. 1882–1887 (2019). https://doi.org/10.1109/SmartWorld-UICATC-SCALCOM-IOP-SCI.2019.00331 18. Szalapski, T., Madria, S.: Real-time data compression in wireless sensor networks. In: 2010 Eleventh International Conference on Mobile Data Management, Kansas City, MO, pp. 307–308 (2010). https://doi.org/10.1109/MDM.2010.32 19. Jackson, L.B.: Digital Filters and Signal Processing, 2nd edn., pp. 255–257. Kluwer Academic Publishers, Dordrecht (1989) 20. Vaidyanathan, P.P.: The Theory of Linear Prediction. Morgan & Claypool Publishers, San Rafael (2008) 21. Ramirez, M.A.: A Levinson algorithm based on an isometric transformation of Durbin’s. IEEE Signal Process. Lett. 15, 99–102 (2008) 22. Hannan, E.J., Quinn, B.G.: The determination of the order an autoregression. J. Roy. Stat. Soc. Ser. B. 41, 190–195 (1979) 23. Official site of STMicroelectronics. https://www.st.com/en/microcontrollersmicroprocessors/stm32l151-152.html 24. Official site of Semtech Corporation. https://www.semtech.com/products/ wireless-rf/lora-transceivers/sx1272 25. Official site of Chirpstack project. https://www.chirpstack.io/

Computing Load Distribution by Using Peer-to-Peer Network Anton Mamonov, Ruslan Varlamov, and Soltan Salpagarov(B) Peoples’ Friendship University of Russia (RUDN University), 6 Miklukho-Maklaya St., Moscow 117198, Russian Federation [email protected], [email protected], [email protected]

Abstract. Modern computation problems arise that cannot be solved by increasing the number and quality of computers alone. In this work, we develop distributed computing methods. By applying knowledge from different areas of science, such as queueing theory and theory of computation, we create our own distributed computing system. The main idea behind our approach is the equality of hierarchy and decentralization, and generalization of calculations, covering more high-performance computation areas. Usage of peer-to-peer architecture requires a thoughtful design but offers several advantages, which are discussed in this work. To compose our system, we set a mathematical model of the target situation, draw attention to its weaknesses, and develop software principles to resolve them. After solving several design issues, we create simulation models to analyze the effectiveness of the future system. After analyzing the models, we select the next steps to improve and finalize our system. Keywords: p2p · Distributed computing of computation · Program design

1

· Queueing theory · Theory

Introduction

The last decade has seen such major changes as computation. The only thing that can outpace the performance of the equipment is the increased software requirements. With each new generation of computing or networking devices, a dozen more high-performance technologies are emerging. In other words, there is a race between supply and consumption in the IT sphere [1]. As a result of this protracted situation, we have a myriad of computing devices of various capacities, most of which have long since ceased to meet the requirements. Providers constantly update and increase the quantity of their The publication has been prepared with the support of the “RUDN University Program 5-100” (A. Mamonov, original draft preparation; R. Varlamov, visualization; S. Salpagarov, project administration). c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 521–532, 2020. https://doi.org/10.1007/978-3-030-66242-4_41

522

A. Mamonov et al.

products. Thus, there is a large pool of computing devices that are used only on a part-time basis and are not suitable for modern high-performance tasks. These trends have been observed and studied for some time [2]. This is a great example of using distributed computing, for example [3]. Despite this, many devices are not connected to any of them, and much of the computing power is wasted. The number of these computing capacities can reach the performance of several supercomputers, while the device itself can be used to some extent. There are several reasons for this. It is most difficult to configure and connect to distributed systems. Even with the growing familiarity with high technology among ordinary users, it is still difficult for the average person to work with the program outside of the clicking scenario. So we have a situation where, despite the huge amount of idle computers, the cost of deploying distributed computing systems is too high for any normal use. In our view, this is due to the most commonly used centralized architecture, which is not an optimal method of distributing computation. Another possible analogue for this is the peer-to-peer architecture, already used to some extent for distributed computing, for example [4]. So we decided to develop a new noncentralized method of dissemination. This paper is structured as follows. Section 2 elaborates currently existing methods of high-performance computing. In Sect. 3 we present a conceptual model of PDCS. In Sect. 4 we outline the theory of algorithms in complexity estimation. In Sect. 5 we outline some design problems and decisions in network establishment. Section 8 describes the distribution process of PDCS. In Sect. 6 we evaluate the resulting system. Finally, in Sect. 7 we summarize our contributions.

2

High-Performance Computing Overview

The problem of high-performance computing is not new. It has a long history of finding solutions. It finds them in various fields of science. Before proceeding to develop our solution, we considered the most significant trends in this direction. The use of graphics processors for general purpose computing has recently become popular, as the graphics processor has good computing power, which is usually idle [5,6]. But this is not suitable for all problems, the architecture of the system becomes more complex and not as energy efficient as CPU and FPGAs. You can also use special high-level, numerically oriented programming languages such as Matlab, Scilab etc. A lot of scientific and developing efforts are focused on their constant upgrading, which helps computer algebra systems stay up-to-date [7]. Although this approach can save a lot of time, it is not used for any task, and even though tasks will be solved faster, this time gain is not satisfactory for some of them. There are also some fundamental researches in the computing area. The most promising technology right now is quantum computers [8]. However, even though promising, quantum computing is far from the point where it will be accessible to

Computing Load Distribution by Using Peer-to-Peer Network

523

everyone. Much more common, but still inaccessible for the majority of scientific society tools for high-performance computing are supercomputers [9]. This article specifically delves into distributed computing technologies. Work even though on distributed computing started with a very applied purpose - for military needs, and namely, the automation of secret communication processes and intelligence processing information has been conducted intensively in the United States since the 1960s. This technology is currently used in many volunteer and commercial projects [10]. For example, BOINC - The Berkeley Open Infrastructure for Network Computing, is an open-source middleware system for volunteers and grid computing [11]. Currently, in mid-2020, it has an average daily performance of about thirty thousand petaflops, from eight hundred thousand of computers. But to use even a fraction of this, newcomers will need to learn how to build up their project, and then draw attention to it. On the other end, while participants, donating their performance to the system, are not burdened with such difficulties, but also has no benefits from it. In case you want to set up a more equal system, you will need either learn how to modify one of the existing solutions or, more likely, build it up yourself. Which, even with the usage of specific libraries and utilities, is no easy task. JPPF [12] − an open-source Grid Computing platform is written in Java, written with sole propose of easing said process, still requires well-honed programmer’s skills. Although all those solutions are valid in their areas, there is a lack of userfriendly technologies, ones that would not require additional studies or financial investment. So, we present PDCS - Peer-to-peer distributed computing system, a network which use knowledge from teletraffic engineering and computational complexity analysis to manage beneficial calculation distribution for all participants.

3 3.1

Concept Mathematical Basis

To design an efficient distributed computing system, we raise the issue of load balancing. To do this, we’re using models from the queueing theory [13]. It is a science field that studies queueing systems, and a computing system can be easily interpreted as such. Consider the work of the office with v employees, each of whom uses a personal computer for periodic calculations. In the terminology of the queuing theory, each employee is a stream of applications and personal computers are the service devices. With the flow rate of applications λ, the processing speed μ, and with the maximum number of applications in the queue of the device r, it is possible to compose an Erlang model and calculate the time characteristics [14]. However, for the standard situation, when each employee uses only his personal computer, not one common system, but a set of v separate systems is

524

A. Mamonov et al.

formed. In a situation like this, when λ is small and μ is large, there is an imbalance between the individual devices - while half of them are free, the other half are in the queue and vice versa. But if you use middleware for communication between devices, it is possible to combine the threads into a single thread with flow rate λ and the total queue capacity R = r ∗ v (Fig. 1).

Fig. 1. Model on divided (left) and distributed (right) system

Even with the additional time spent on transferring information between devices, the benefit of using a distributed system is obvious. The shorter total time spent in the queue reflects more efficient use of the available computing resource. To further increase the efficiency of calculations, it is necessary to take into account the heterogeneous nature of devices and applications in a real situation. Employee requests can vary in complexity, just as the computers used can vary in power. To take this into account, you can turn to multiservice models. Assuming the presence of K types of services, it is necessary to convert the scalar quantities λ and μ into vectors of dimension K and compose a vector of comparative complexity b. The traditional model of a multiservice system involves assigning a standard unit to the least complex request and displaying the complexity of the rest through comparison with the standard unit. After that, in the mathematical model, the processing of an application of the i-type requires the work of the bi number of devices. With the addition of a difference in the power of computers in this model, a vector q of dimension v was formed - the number of applications of minimal complexity performed by one of v devices per unit time. To implement such a model in practice, it is necessary to organize a distributed computing system. To do this, you need to write software that will read user requests, generate applications and distribute them over the network. The main principles that should be met by the software are the generalization of calculations, the equality between network nodes and the transparency of working with the system.

Computing Load Distribution by Using Peer-to-Peer Network

3.2

525

Generalization

Generalization of computation stands for the reduction of requests received by the system to a set of generalized operations. In the terminology of Post, which was set in one of the first articles concerning the theory of algorithms [15], the concept of a general problem, which is consisting of a class of specific problems, is introduced. Thus, giving an algorithm for solving one general problem, we obtain a solution for a whole set of specific problems. This is fairly obvious for simple cases such as arithmetic operations, but the boundaries of generalization are easily extended if recursion is allowed. So, for example, calculating the factorial is essentially a special case of multiplying a natural number by the factorial of the previous one. The calculation of the number of combinations is several divisions of certain factorials. And this means that the calculation of one or another probability can be reduced to a set of arithmetic basic operations. The developed system is based on the distributed computing system considered in [4]. This system was used to calculate the probability of universal transmission in a streaming television system. These calculations include multiple computations of combinatorial formulas and their time complexity grows exponentially depending on M - the number of viewers and N - the number of channels. The distribution of calculations in this paper was proposed to be carried out following one of two methods - the first involves the separation of each combinatorial formula into factorial components and their distribution over the network. The second proposes the separation of the formula by the external sum operator. Both of these methods solve one specific problem, each time for specific input. And both of them can be generalized to sequential applications of arithmetic primitives, some of which are performed centrally on one node, and some are distributed throughout the system. By giving the system the ability to compute primitives nested into each other, all that remains is to provide a generalization process – the formation of these primitives from the user’s request. 3.3

Equalization

Equality between network nodes stands for the implementation of Peer-to-peer architecture during system creation. Peer-to-peer technology which has been developing over the past decade, continues to find new uses. For example, peer-to-peer architecture is not new for the field of time-consuming computing. Although the most common form of distributed computing today is the grid, the traditional one is implemented with a centralized architecture, you can already find examples of peer-to-peer computing [10]. Nowadays many initially centralized platforms and distributed computing tools are gradually integrating the ability to implement partial or full peer-topeer. This is because peer-to-peer networks have many advantages over classic

526

A. Mamonov et al.

client-server counterparts. Among them, easy scalability, high fault tolerance, simple moderation, etc. In several scenarios, these qualities can greatly outweigh the natural flaws of decentralized systems - poor connectivity, complexity in development, etc. In the situation under consideration, the most valuable will be the fact that the organization of a network using a peer-to-peer architecture will allow us to avoid the difficulties of installing and separately maintaining a server. This should provide a way to popularize peer-to-peer computing, which, in turn, will provide peer-to-peer systems with the necessary capacities. 3.4

Transparency

Transparency of the system means that its internal workflow is invisible to users. The main source of resources for any peer-to-peer system is its users. A large number of nodes means more memory, higher speeds for file sharing and more computing power for distributed computing. To provide our system with users’ resources, we make system transparency one of the main development goals. It’s not enough to provide significant time gains in time-consuming calculations. The system also should not force users to learn local syntax or make complicated queries. Any advantage in the speed of actual calculations might be lost if a comparable amount of time is needed to organize them. In such a situation, the audience of the system will significantly narrow, which will reduce the total number of nodes and, as a result, the output of the system. To provide a user-friendly interface and low entry threshold, it was decided to change the focus of development from creating a domain-specific language in favour of using the well-known general-purpose language of mathematical formulas. There is no need to have special education to know that “=” means “equal to”, that the dependent parameters are listed in brackets after the name of the formula. Just having an education is enough.

4

The Algorithmic Analysis

During the construction of the system, the question arose about the efficient allocation of resources, but for this, it was first necessary to decide how the complexity of a given task would be assessed. Fortunately, we are not the first to encounter such a problem and there is a very large range of works devoted to the algorithmic analysis [16]. Our system should be able to calculate the complexity of the task, regardless of the class of algorithms used in it. When analyzing the behaviour of the complex function of an algorithm, the asymptotic notation [17] accepted in mathematics is often used to show the growth rate of a function, masking specific coefficients. Such an estimate of the complexity of the algorithm is called the complexity of the algorithm and will determine the preferences in using one or another algorithm for large values of the dimension of the source data in our system.

Computing Load Distribution by Using Peer-to-Peer Network

527

For our system, the best-known estimate of the complexity of the Big O notation algorithm is best suited, since the system must allocate enough resources so that one node does not delay all the others. There are several methods for determining the operating time of a software implementation of an algorithm. Since the system implies solving problems of any type, the most suitable method is that can determine the implementation time of any algorithm. The most straightforward and at the same time effective way of estimating the complexity of the algorithm is the operational analysis, the meaning of which is to obtain the operational function of the complexity for each of the elementary operations used by the algorithm taking into account data types. And then experimentally determine the average execution time of this elementary operation on a particular computer. The expected lead time is calculated as the sum of the products of the operational complexity for the average time of operations: Since the system can be used in various fields of scientific research, calculations can use a huge range of elementary operations. Therefore, at the beginning of its work, the computer will calculate the approximate time for all these operations. Also, the computer that sends a request for solving the problem will count the number of simple operations involved in it. Based on these data, the task will be most effectively divided using the distribution mechanism.

5

The Network

While peer-to-peer architecture offers some important advantages, it also poses several challenges to network maintenance. There is no centralized server to receive and sort out all system messages. Without a universal proxy, numbers of connections between nodes are increasing in arithmetic progression. That imposes a huge restriction on the amount of information exchanged by nodes. To exchange such messages without overloading network, it is convenient to use UDP - user datagram protocol. It is a common communications protocol, mainly used for connections with low latency and loss tolerance between applications. By using UDP it’s easy to maintain receiving and sending of messages - datagrams, with only one port for any possible addresses. But, while UDP doesn’t create any logical binds on connected nodes, it also doesn’t support transmission reliability. To send a message, UDP needs to cut it in parts of appropriated size, and it doesn’t guarantee that all of those parts will arrive on the recipient in the right order or arrive at all. Fortunately, it possible to avoid fragmentation altogether, if the original message is small enough to fit completely in one datagram. To find out the exact maximum size of the message, the respective specifications can be used. The specification for Internet Protocol [18] tells us that a minimum IP packet length that all IPv4 members should support is of 576 bytes. Therefore, to avoid fragmentation and possible loss of UDP packets, and also that they will be received by any host, the size of the data in datagrams should not exceed minimum IP packet length minus maximum IP header length, minus UDP header

528

A. Mamonov et al.

size [19]. In numbers, 576 − 60 − 8 = 508 bytes for each message. In most programs the encoding of characters holds 2 bytes for each char, thus up to 254 characters can be transmitted within a single datagram. While formulas and values of variables do not exceed this restriction, it’s safe from any incidental losses by fragmentation. As was mentioned earlier, PDCS is working with natural mathematical distribution. For example, a sum operation, placed over the expression F with dependency on a variable i, in range from the lower limit i0 to the upper limit N. N  F (i) (1) Sum(N, F (i)) = i=i0

It is abstract enough to cover anything from integral sums to probability calculations. To move from abstraction to practical implementation, we will need only one line that represents the exact formula of F and values of lower and upper limits of summarizing. Even some advanced queries with multiple variables can easily fit into 254 characters, and the answer even larger. The implementation of these design decisions present itself in simple and effective way. The network part of PDCS, consisting a virtual room and participating nodes, is mapped by two appropriate classes: Room and Node. So the Node class is a virtual client, and the Room class is a virtual server. To operate properly, each PDCS client needs only to contain a list of Nodes as a Room class, and some vital information about Nodes, such as their IP addresses, measured performance, and current state. When the software starts, a new empty room is automatically created, where the first node immediately turns on, under the computer’s own IP address. Broadcast network initialization information about this new PDCS client via the dedicated port. Other clients already on the network send an invitation to join in response. After completing the virtual handshake, both newly connected clients create a new record in their virtual rooms. During the operation, reception and sending of messages, the virtual room updates the information about its status, including the set of nodes therein, their current occupation, the queue of requests for calculations. If one of the nodes does not reply to the system messages sent to it, including the special periodic signal “ping”, it is excluded from the room. Upon receipt of a set of requests for calculations, the room sends them to free nodes, waiting for confirmation of receipt of the request and, if necessary, repeating the sending until all requests are satisfied.

6

The Mechanism of Distribution

The overall efficiency of any system depends to a large extent on the distribution of the workload. Especially in targeted systems, and their request-report process on one node inevitably involves other nodes. Distributed computing is a striking example of these systems.

Computing Load Distribution by Using Peer-to-Peer Network

529

But simply installing the messaging described in the previous section will not solve all distribution problems in our system. To work properly and efficiently, equal nodes will have to share the same information about each other’s condition. Each time one node assigns itself to a task, it needs to inform the entire system about that, same for the moment the task is completed. In addition, it is necessary to exchange a standard ping message to confirm the online status of each node. If one of the nodes does not respond or does not execute the echo request in time, the workload distribution should be changed immediately. In practice, total knot failure is unlikely. But as long as the PDCS client operates as a background process, the user can and will use his computer in other actions, which will cause a dynamic change in the performance of the host. For information to remain relevant, nodes must check their performance during each calculation, as described in Sect. 4. In case a node does not have queries for some time or the client performance is changed directly by the user, an automatic query must be formed. Now, with the installed network and updated system status information, the PDCS nodes can execute the actual distribution for the actual calculations. For a practical example, set expression F to the formula for the probability that the number of successes for a set of independent experiments N equals i. With each independent success or failure respectively equal to p and q, probability of at least i0 successes will be: Sum(N ) =

N 

i pi q N −i CN

(2)

i=i0

Such request can be entered by user in string form and will look like : input : sum(i = i0, N)(p ∧ i * q ∧ (N-i) * comb(N, i) Which will be broken down by a parser and then used to form a secondary network query, one for each member of the sum. These requests form a queue at the node and are sent to free nodes. If the number of requests exceeds the number of free nodes, some of them remain unaccounted for until the first requests are fulfilled. solve : (i = i0)(p ∧ i * q ∧ (N-i) * comb(N, i) solve : (i = i0+1)(p ∧ i * q ∧ (N-i) * comb(N, i) e.t.c. solve : (i = N)(p ∧ i * q ∧ (N-i) * comb(N, i) As it is common for calculation of combinations, the bigger difference between N and i values is, the bigger result will be. So, it makes sense to send the first half of secondary requests to more powerful nodes, and the second half to the others. Thus, the responses will be more synchronized. Once the free node receives one of the secondary requests, it sends back a confirmation, then informs the whole system that it is currently occupied, and starts the calculations. If case origin node doesn’t receive a confirmation for a specific request, it withdraws this request back to the queue. The same happens if confirmation is received, but the response does not arrive in twice the time approximated.

530

A. Mamonov et al.

When all secondary requests are executed and sent back to the source node, it combines them in a final sum and notifies the user with a numerical output.

7

System Estimation

Before developing the prototype of the system, it was necessary to check superiority of our distribution method over the others, as well as to measure its approximate effectiveness: the time saved by the system, stability of the system. For this, it was decided to develop a system model using a suitable simulation program. The first model was to be based on individual computers that solve problems on their own, and the second was to represent our approach (Fig. 2).

Fig. 2. Model of separate computing

The choice fell on AnyLogic. It is a multimethod simulation modelling tool. It supports agent-based, discrete event, and system dynamics simulation methodologies. It is suitable for our task, as it has fairly extensive functionality that allows you to create dynamic models with different amounts of input and output data. At the same time, it allows you to track each task individually and has built-in statistics tools. Also, the program itself is written in Java, just like our system, which saved time on building models (Fig. 3). The P2P model showed overall high level of reliability and validity while the comparison of models was used to measure the potential time gains.

Computing Load Distribution by Using Peer-to-Peer Network

531

Fig. 3. Model of p2p computing

8

Conclusion

In this article, we have studied a problem with high-performance computing, and various ways of its solution. Concluding that most solutions are not user-friendly or easily accessible, we have developed our paradigm of the computing system and created a mathematical model for it. With the usage of different scientific fields, we have improved our design and created simulating models to analyze the resulting system. In further research, we aim to use obtained models to create a software template of PDCS - peer-to-peer distributed computer system and conduct a comparative analysis between our system and other solutions for high-performance computing problem.

References 1. Trattner, A., Hvam, L., Forza, C., Herbert-Hansen, Z.N.L.: Product complexity and operational performance: a systematic literature review. CIRP J. Manufact. Sci. Technol. 25, 69–83 (2019). https://doi.org/10.1016/j.cirpj.2019.02.001 2. Post, D.: The future of computing performance. Comput. Sci. Eng. 13(4), 4–5 (2011). https://doi.org/10.1109/MCSE.2011.69 3. Liu, G., Xiao, Z., Tan, G., Li, K., Chronopoulos, A.T.: Game theory-based optimization of distributed idle computing resources in cloud environments. Theoret. Comput. Sci. 806, 468–488 (2020). https://doi.org/10.1016/j.tcs.2019.08.019

532

A. Mamonov et al.

4. Khachumov, K.M., Salpagarov, S.I., Mamonov, A.A., Varlamov, V.A.: Combinatorial problem solving method by allocating resources. In: Selected Papers of the IX Conference “Information and Telecommunication Technologies and Mathematical Modeling of High-Tech Systems”, Moscow, Russia, 19 Apr 2019 (2019). http:// ceur-ws.org/Vol-2407/paper-07-165.pdf 5. Dubey, S.P., Kumar, M.S., Balaji, S.: GPU computing for compute-intensive scientific calculation. In: Das, K.N., Bansal, J.C., Deep, K., Nagar, A.K., Pathipooranam, P., Naidu, R.C. (eds.) Soft Computing for Problem Solving. AISC, vol. 1057, pp. 131–140. Springer, Singapore (2020). https://doi.org/10.1007/978981-15-0184-5 12 6. Mittal, S., Vetter, J.S.: A survey of methods for analyzing and improving GPU energy efficiency. ACM Comput. Surv. 47(2) (2015). 23 https://doi.org/10.1145/ 2636342. Article 19 7. Kulyabov, D.S., Korol’kova, A.V., Sevast’yanov, L.A.: New features in the second version of the Cadabra computer algebra system. Program. Comput. Softw. 45(2), 58–64 (2019). https://doi.org/10.1134/S0361768819020063 8. Zulehner A., Wille R.: Quantum computing. In: Introducing Design Automation for Quantum Computing. Springer, Cham (2020). https://doi.org/10.1007/978-3030-41753-6 2 9. Gertsenberger, K., Rogachevsky, O.: Mock data challenge for the MPD/NICA experiment on the HybriLIT cluster. In: EPJ Web Conference, vol. 173, p. 04006 (2018). https://doi.org/10.1051/epjconf/201817304006 10. Ivashko, E., Chernov, I., Nikitina, N.: A survey of desktop grid scheduling. IEEE Trans. Parallel Distrib. Syst. 2882–2895 (2018). https://doi.org/10.1109/TPDS. 2018.2850004 11. Anderson, D.P.: BOINC: a platform for volunteer computing. J. Grid Comput. 18(1), 99–122 (2019). https://doi.org/10.1007/s10723-019-09497-9 12. Pengembangan Prototipe Sistem Network Rendering Alternatif Berbasis JPPF (2018). https://doi.org/10.22146/jnteti.v7i1.395 13. Naumov, V.A., Gaidamaka, Y.V., Samouylov, K.E.: Computing the stationary distribution of queueing systems with random resource requirements via fast fourier transform. Mathematics 8, 772 (2020). https://doi.org/10.3390/math8050772 14. Basharin, G.P.: Lectures on the mathematical theory of teletraffic 15. Post, E.: Finite combinatory processes-formulation 1. J. Symbol. Logic 1(3 Sep), 103–105 (1936). https://doi.org/10.2307/2269031 16. Cormen, T.H., Leiserson, C.E., Rivest, R.L.: Introduction to Algorithms, 3rd edn., p. 47. MIT Press, Cambridge (2009). ISBN 978-0-262-53305-8 17. Hildebrand, A.J.: Asymptotic Notations. Asymptotic Methods in Analysis. Math 595 (2009) 18. Postel, J.: INTERNET STANDARD RFC 791 Internet Protocol (1981) 19. Postel, J.: INTERNET STANDARD RFC 768 User Datagram Protocol (1980)

Firewall Simulation Model with Filtering Rules Ranking Anatoly Botvinko1

and Konstantin Samouylov1,2(B)

1

Peoples’ Friendship University of Russia (RUDN University), 6 Miklukho-Maklaya St., Moscow 117198, Russian Federation {bottvinko ab,samuylov ke}@rudn.ru 2 Federal Research Center “Computer Science and Control” of the Russian Academy of Sciences (FRC CSC RAS), 44-2 Vavilov St., Moscow 119333, Russian Federation

Abstract. The article has been written in continuation of a series of works on the evaluation of the probabilistic and time characteristics of firewalls while ranking a set of filtering rules. The problem under consideration is the efficiency reduction of filtering the information flows caused by: a) using a sequential circuit for verifying packet compliance with rules; b) heterogeneous character and variability of network traffic. By using the developed model, the main firewall performance indicators for various traffic behavior scenarios were evaluated. The model proposed allows to evaluate the effectiveness of filtering rules ranking methods in order to improve the firewall performance. Keywords: Firewall · Filtering rules ranking Simulation model · Queuing system

1

· Network traffic ·

Introduction

A firewall (FW) is a local or functionally-distributed tool implementing the control over the information that inputs to the automatic system (AS) and/or outputs from the AS and provides protection of the AS by filtering the information, i.e. its analysis on the set of the criteria and making a decision on its distribution [1]. FW is one of the principal means used to ensure information security (IS) of the AS. That includes the fact that FW allows to solve the tasks of preventing unauthorized access to protected information, its destruction, modification, blocking, copying, providing it to the third parties and its spreading [2]. The permanent maintenance of high performance while filtering network traffic is required to ensure the stable functioning of the critical information infrastructure in conditions of: a) a sharp increase in the information flows volume of common use networks, b) high heterogeneity and variability of the network traffic characteristics; c) wide use of various multimedia protocols and d) an increase in the number of computer attacks. Therefore, the actual task is to increase the c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 533–545, 2020. https://doi.org/10.1007/978-3-030-66242-4_42

534

A. Botvinko and K. Samouylov

efficiency of filtering network traffic flows, as well as to maintain it at the level sufficient to ensure the stable operation of the AS. The fundamental idea of the FW’s rules optimization methods is to provide the increase in the efficiency of traffic filtering by reducing the time for searching the rules that match network packets. The most of the existing rule optimization methods for organizing a rule set use filtering rules ranking and base on a) the current characteristics of information flows [3–6] or b) on the use of various data structures different from a linear list [5,7–10]. In a number of works, there are the methods used for searching and correcting errors in creating the sets of filtering rules [11–13]. These methods don’t take the dynamics of changes in information flows into account. Because of this, they are less adaptive to changes in the nature of the flows filtered. Therefore, when frequent changes in the flow characteristics happen, it is rational to apply ranking methods that: a) are based on the use of statistical estimation and b) take the dynamics of changing in the information flow characteristics into account. The objective of this work is to create a mathematical model for evaluating the firewall performance with an altering set of rules. Unlike earlier works [14–16], the designed model allows to obtain estimates of FW performance while filtering various types and scenarios of network traffic behavior. To achieve the objective, the methods of imitational modelling and representing the FW in the form of a complex system and queuing systems at separate time intervals are used in the work. The results obtained in the work reflect the possibility of increasing the FW performance and the rationality of using the ranking method developed in [16,17] for various traffic scenarios, including the FW functioning with significant overload that is close to the packet loss limit.

2

Method for Ranking Firewall Filtering Rules

Filtering rules are: a) a list of conditions according to which and by using the given filtering criteria the permission and/or prohibition of further packets transmission is carried out; b) a list of actions performed for registration and/or for additional protective functions. The following parameters, attributes, and characteristics of network traffic flows are usually used as filtering criteria: a) service fields of packets that contain network addresses, identifiers, interface addresses, port addresses, and other significant data; b) external characteristics, e.g. time and frequency parameters, and data volumes. Each rule prohibits or permits the transmission of information of a certain kind between subjects and objects. As a result, the subjects from one AS get the access only to permitted information objects from another AS. The interpretation of a rule set is carried out by a sequence of filters that permit or prohibit the transfer of data (packets) to the next filter or to the protocol level [1]. The number of used filters depends on the FW type. So, after receiving the network packet, the verification of the compliance of the packet parameters with the conditions of the first rule takes place;

Firewall Simulation Model with Filtering Rules Ranking

535

if the packet doesn’t meet the conditions in the rule fields, the verification of compliance with the fields of the next rule starts. The first rule that the packet meets will determine the action applied to the package. In case if the packet doesn’t meet any rule, the actions determined by the default policy given by the rule of the last set will be performed.

3

Firewall Model with Filtering Rules Ranking

Modern FWs are complex and multifunctional systems using various hardware platforms, operating systems and types of filters. Also, for all FWs of various manufacturers, such as Cisco Systems, Juniper Networks, the process of information flow filtering includes traffic filtering on the network and transport levels of the OSI model. Thus, in this work a FW model related to the type of packet filters was designed [18–20]. The filtering process is a sequential check of parameters of input packets compliance with the conditions of the ruleset. The packet check is sequentially performed for all of the rules from the set until the first match is found. Only one packet can be checked simultaneously; the rest of the received packets wait for the service start. The packets that don’t meet the permission rules of filtering are rejected (the default prohibition policy is considered). By rule set ranking we will mean the organization of the rules in decreasing order of their weights obtained in accordance with the estimation of the characteristics of information flows filtered. While setting the weights for each rule, a time series is composed and it reflects the number of packets that have been filtered in accordance with the conditions of the rule within several time intervals. With the accumulation of a sufficient number of data, the estimation of the average values of the number of packets for subsequent time intervals takes place. While predicting the values, the nonparametric method of local approximation (MLA) is used [21]. Examples of time series and an algorithm for rule ranking are contained in the work [14]. A model with filtering rules ranking is a complex stochastic system, thus, to describe the model, the approaches to the systems description applied in the theory of queuing systems were used [22–24]. Let’s represent the FW model as a system M = {Z, A, T, F, G, X}, the moment of transition of which from one state to another one is depicted in Fig. 1. Let’s describe the system functioning by introducing the following notations: 1. Z = {z0 , ..., zk , ...} – an array of the system states; A = (μ0 , μ, N, C) – an array of the system states; T – the functioning time interval of the system; the change of system states occurs at discrete time moments t− k = tk − 0, tk ∈ T, k ≥ 1; F – the system states transitions operator; G – the system output operator; X = {x0 , ..., xk , ...} – an array of input signals entering the system; Y = {y1 , ..., yk , ...} – an array of output signals of the system.

536

A. Botvinko and K. Samouylov

Fig. 1. Scheme of the FW model with filtering rules ranking.

2. μ0 – the service intensity during the initial processing of the packet by the FW network card; μ – the service intensity during the checking of the compliance of the packet with one of the rules from filtering set; C – the storage capacity in the system; N – the number of rules in the filtering set. 3. zk = (rk , dk ) – the system state on the time interval [tk , tk+1 ), where k ) is the set of rules in which the component rik , i = 1, ..., N is rk = (r1k , ..., rN a rule located in i-place of the set; dk = (dk1 , ..., dkN ) is the vector of packet service times, in which dki , i ∈ 1, ..., N corresponds to the processing time of i-type packets on the interval [tk , tk+1 ). 4. xk = (xk1 , ..., xkN ) ∈ X the input signal; the component xki , i = 1, ..., N – a random variable characterizing the number of i-type packets, received in the system on the time interval [tk , tk+1 ). 5. pk = (pk1 , ..., pkN ) is a vector of the rule weights, set in accordance with the MLA estimation of the information flows characteristics; the component pki , i = 1, ..., N corresponds to the weight of the rule standing in i-place on the interval [tk , tk+1 ). 6. yk = (qk , vk , wk , uk ) ∈ Y – the output signal, the components of which correspond to the estimation of performance indicators on the time interval [tk , tk+1 ): qk – the average number of packets in the drive, vk – the average service time of a packet in the system, wk – the average time of waiting for the start of packet servicing in the system and uk – the average time the packet stays in the system. 7. F (A, zk , xk ) = zk+1 – the operator of system states transitions at the moment  of time t− k+1 : calculates x k that evaluates the information flows characteristics  and determines the vector of the rule weights pk according to x k . 8. zk+1 = (rk+1 , dk+1 ) determines the system state, where the vector rk+1 is calculated by ranking the rule set rk according to the weights pk , and the vector dk+1 is calculated in accordance with the obtained set rk+1 and intensities μ0 , μ of the packet servicing. 9. G(A, zk , xk ) = yk+1 at the moment of time t− k+1 determines the system performance indicators on the time interval [tk , tk+1 ). Considering the functioning of the system M on each interval [tk , tk+1 ) separately, let’s represent the system M as a queuing system (QS) with a distribution function (DF) Bk (t) of the requests service duration, that depends on the filtering rules order on the time interval [tk , tk+1 ). The request flow according

Firewall Simulation Model with Filtering Rules Ranking

537

to the packet flow entering the FW is received by the QS. Given QS at the request Poisson flow according to the Basharin-Kendall classification will have the MN /PH/1/C type. Receiving the characteristics of given QS is performed by imitational modeling, and the results of it are given in the fourth section of this article. Further, there is a terminology used in this work and it is accepted by queuing theory: the packets entering the model and being the entities in the imitational model are considered as QS requests.

4

Designing of an Imitational FW Model with Rules Ranking

The imitational model is intended to evaluate the FW performance indicators with rules ranking. Imitational methods using allows to remove restrictions on the DF of the incoming request flow and the request service of model M. So, the imitational model makes it possible to receive the estimation of FW performance while filtering various types and scenarios of network traffic behavior. Also, the imitational model reproduces the process of the system M functioning: – Packets filtering by FW corresponds to request servicing in the QS of MN /PH/1/C type; – the calculation of weights, and rules ranking corresponds to the operator F application; – the calculation of the estimations of FW performance indicators corresponds to the operator G application. To design the imitational model, the discrete-event modeling approach is used. The choice of this approach was made because of: a) strictly defined list of events arising during the functioning process; b) the necessity of receiving statistical information that are collected in discrete-event modeling systems (average service time and waiting time in the queue of requests, average number of requests in the queue, etc.); c) its wide application in queuing theory [25]. For the software implementation, the Simulink graphical environment of imitational modeling was used alongside with the application of the SimEvents discrete state library using the queuing theory apparatus of and queuing systems. The Simulink environment is integrated into the MATLAB matrix computing system, and that allowed to use built-in mathematical algorithms and data processing means to implement the features of the system M functioning, i.e. rules ranking, calculating MLA estimations and changing system states at different time intervals. The usage of MATLAB provided a high system ability for scaling and expanding the functionality without significant changes in the program architecture. The input data in the model are the requests serviced in accordance with the FCFS principle (First-Come, First-Served). Only one request can be served simultaneously. The DF of request service time is a phase-type function.

538

A. Botvinko and K. Samouylov

The requests waiting for the service are in the final queue with the FIFO service discipline (first in, first out). If the queue is full, the incoming request leaves the system without servicing. The output data after the modeling are the estimations of the QS performance indicators presented in graphical and tabular form, as well as comparative indicators of the effectiveness of rules ranking, that are calculated on their basis for various scenarios of traffic entrance. All of the time-depending values in the imitational model have microsecond measuring. Thus, there is a possibility for the user to change the dimension. The software implementation of the imitational model consists of the Simulink model file and MATLAB command sequence files. The model file contains visual-oriented programming blocks that apply QS elements, display the information about the progress of modeling and record the input signal into the MATLAB workspace (see Fig. 2). The command sequence files contain program code applying the model functionality: a) setting the initial system parameters; b) calculating the MLA estimations of information flow characteristics; c) setting the weights; d) rules ranking; e) processing data received while modeling; f) graphical and tabular presentation of modeling results; g) model launch commands in the Simulink environment.

Fig. 2. Flowchart of Simulink FW model with filtering rules ranking.

While starting the modelling, the initial parameters of the Simulink model are entered into the M-file – the number of the rules, the initial rule set, the number of request types, the storage capacity of the request store, DF, the intensity of requests’ receiving and servicing, etc. Then, the modeling of the packet package filtering by FWs is performed in accordance with the set parameters. Generation of various request types is performed by using the “Entity Generator” block. The calculation of the service time is performed by using the “serviceTime func” function implemented in the “Simulink Function” block (see Fig. 3).

Firewall Simulation Model with Filtering Rules Ranking

539

The “serviceTime func” function is a custom Simulink function calculating the service time in accordance with the set model parameters. The input arguments of the function are: a) “Packet Att” – is the type of request filtered; b) “TimeDMA” – is the service intensity during initial packet processing by the FW network card; c) “TimeOnRule” – is the service intensity while checking of the compliance of the packet with one rule of the filtering set; d) “RuleSet” – is a current rule set; e) “CountRule” – is the number of filtering rules. The output arguments are: a) the packet filtering time by FW and b) the “Index” signal for the calculation of the number of packets that match for each rule type.

Fig. 3. Custom “serviceTime func” function for calculating the service time.

The algorithm for calculating the service time is implemented in the M-function task block “Compare Function” and is shown in Listing 1. Listing 1. “Compare Function” function function [ServiceTime, Index] = ... fcn(Packet_Att,Time_DMA, Time_on_Rule, Rule_Set, Rule_count) Index = -1; ServiceTime = 0; for i = 1:1:Rule_count-1 if Packet_Att == Rule_Set(i) && Packet_Att ~= 0 Index = i; ServiceTime=gamrnd(Index,Time_on_Rule)+gamrnd(1,Time_DMA); break elseif Packet_Att ~= Rule_Set(i) && i == Rule_count-1 ... && Packet_Att ~= 0 Index = 0; ServiceTime=gamrnd(Rule_count,Time_on_Rule)+gamrnd(1,Time_DMA) end end end

540

5

A. Botvinko and K. Samouylov

Evaluation of the Firewall Performance Indicators

Usually, FWs are located at entry points at the borders of protected networks or network segments. Being a network node that processes large volumes of incoming and outgoing traffic, FW significantly influences on network performance, and FW performance indicators largely correspond to key characteristics of border network devices - routers, switches, etc. [26]. These key features include: – packet service delay – the time FW that has received the packet takes to start its transmission to the next node in the network; – serialization delay – the time that takes a network card to transmit the packet at a given width of bandwidth. In this work, the serialization delay isn’t taken into account, since for a wide bandwidth the serialization delay is negligible; – propagation delay – the time for transmission of a bit of information in a physical communication line. The bit is transmitted with a propagation speed depending only on the physical environment of data transfer. Therefore, this delay type is not considered in this work; – packet delay variation (Jitter) – characterizes the deviation value of the packet service time from the average value of packet service time. High values of packet delay variation may be caused by queue lengths variations in FW buffers or packet processing time variations; – packet loss – the number of lost packets or the proportion of lost packets to the total number of transmitted packets. With sharp bursts in packet income intensity, large packet queues can be formed and they need to be processed. Since the buffer memory in the FW network card is limited, a part of the packets may be lost. Also, the packet losses are possible when the information distortion is detected. In this work, it is assumed that packets are transmitted without any information distortion; – packet transmission delay (or packet delay) – is the time that the FW spends on processing and transmitting the packet. Packet transfer delay is the sum of the serialization, propagation and service delays. Since the serialization delay and the propagation delay are not considered in the work, and the packet service delay is a separate efficiency indicator, the packet transmission delay is not considered as well. So, the packet service delay is used as the primary indicator of the FW performance. It consists of: a) the time required for the packet initial processing; b) the time the packet stayed in the buffer memory and c) the time for searching the rule corresponding to the packet filtered. To evaluate the effectiveness of rules ranking, comparative indicators are used. They are calculated between the initial time interval (where the ranking wasn’t performed) and the time intervals where the rule set was ranked: ΔQS = qs − q1 , ΔVS = vs − v1 , ΔWS = ws − w1 , where s is a number of the time interval where the evaluation was calculated. The network traffic in the model is generated by a source summarizing stationary request Poisson flows with different intensities. In this case m packet

Firewall Simulation Model with Filtering Rules Ranking

541

types enter with high intensity λi = λkhigh , and the rest of the requests – with low intensity λi = λklow , where i = 1, ..., m is the request type; k is the number of time interval. Let’s call the request with high intensity as priority requests, and requests with low intensity as non-priority requests. Three scenarios of traffic behavior are considered under the imitational modeling: – the intensities of priority and non-priority requests are constant at each time interval, and the QS functions without any overloads; – the request intensities increase on each time interval λklow = λk−1 low + 1 0.1λ1low , λkhigh = λk−1 + 0.1λ , the QS starts functioning with a slight high high overload on the interval [tk , tk+1 ), k = 1, ..., 11 (the queue size doesn’t exceed 2.5% of the storage drive capacity) and a significant overload on the interval [tk , tk+1 ), k = 12, ..., 15 (the queue size is 45%, ..., 80% of the storage drive capacity); – the request intensities increase on each time interval λklow = λk−1 low + 1 0.1λ1low , λkhigh = λk−1 + 0.1λ , the QS starts functioning with a signifihigh high cant overload approaching the limit of request losses because of the overflow of the storage drive at all intervals [tk , tk+1 ), k = 1, ..., 15 (the queue size is 95%, ..., 99% of the storage drive capacity). Raw data used to conduct the imitational modeling of the network traffic filtering process are presented in Table 1. The rules ranking while modeling starts on the interval [t5 , t6 ) and further, on each time interval. The evaluation of the performance indicators received during the modeling is presented in Fig. 4. As it can be seen from the figures, the rules ranking leads to reducing the average packet servicing time for all traffic scenarios. The largest difference between request servicing is ΔV12 = 0.078 [ms]. For the 1st scenario (the functioning mode without packet losses caused by buffer memory overflows) the highest-ranking effect is reached, i.e. all of the comparative indicators show the increase in the FW performance. In the 2nd scenario than can be conditionally considered as the start of a DDoS attack, the ranking has allowed to decrease the growth rate of the system load coefficient. The average waiting time for the service start and the packet residence time in the system approaches the values of the indicators of the 3rd scenario on the interval [t13 , t14 ). In the 3rd scenario (DDoS attack with high intensity of incoming packets), the rules ranking provided a decrease of the average packet servicing time and, as a result, the average packet residence time decreased. In this case the comparative indicators have larger values than in the 1st and 2nd scenarios because of the high initial values of performance indicators.

m

μ−1 0 μ−1 C

tk+1 − tk λ1low , λ1high

λ1low , λ1high

λ1low , λ1high

5000 [Rules] 750 [Rules] 2.7 · 10−3 [RPS] 5 · 10−5 [RPS] 1000 [Requests] 1000 [ms] 0.68, 1.37 [RPS] 3.16, 6.32 [RPS] 14.7, 28.9 [RPS]

N

Table 1. Raw data

542 A. Botvinko and K. Samouylov

Firewall Simulation Model with Filtering Rules Ranking 0.13

120 1st scenario

st

1 scenario

time the packet stays in the system [ms]

2nd scenario

0.12

average service time [ms]

2rd scenario

0.11 0.1 0.09 0.08 0.07 0.06

2nd scenario

100

3rd scenario

80

60

40

20

0.05

0

0

5

10

15

0

5

interval [tk,tk+1]

10

15

interval [tk,tk+1]

Average service time.

Average waiting time. 1000

120 1st scenario 2nd scenario

100

3

rd

number of packets in the drive [requests]

average time the packet stays in the system [ms]

543

scenario

80

60

40

20

0

900

1st scenario

800

2

nd

scenario

3

rd

scenario

700 600 500 400 300 200 100 0

0

5

10

15

interval [tk,tk+1]

Average time the packet stays.

0

5

10

15

intreval [tk,tk+1]

Average qty. of packets in the drive.

Fig. 4. Firewall performance indicators

6

Conclusion

So, in the work, an imitational model was designed, and that allows to evaluate the main firewall performance indicators. The estimates obtained demonstrate that, for various traffic behavior scenarios, the ranking has increased the FW performance by 10%, ..., 17% compared to the traffic filtering without ranking. The best of all effect of ranking is achieved when simulating the functioning of the queening system in conditions of overload, storage overflow and subsequent packet loss. That is typical for a high-volume and long-term DDoS attack. Therefore, the results of the work confirm the assumptions about the usefulness of applying the rules ranking to increase the traffic filtering efficiency, including the cases while DDoS attacks take place.

544

A. Botvinko and K. Samouylov

References 1. Rukovodyashhij dokument. Sredstva vychislitelnoj texniki. Mezhsetevye ekrany. Zashhita ot nesankcionirovannogo dostupa k informacii. Pokazateli zashhishhennosti ot nesankcionirovannogo dostupa k informacii [Governing document. Computer aids. Firewall. Protection against unauthorized access to information. Indicators of security against unauthorized access to information] (1997). https://fstec.ru/tekhnicheskaya-zashchita-informatsii/dokumenty/ 114-spetsialnye-normativnye-dokumenty/383. Accessed 25 Sep 2020. (In Russian) 2. Trebovaniya k sozdaniyu sistem bezopasnosti znachimyx obektov kriticheskoj informacionnoj infrastruktury rossijskoj federacii i obespecheniyu ix funkcionirovaniya [Requirements for creating security systems for significant objects of critical information infrastructure of the Russian Federation and ensuring their functioning]. (Approved by the order of Federal service for technical and export controlof, V. No 235, 21 December 2017). https://fstec.ru/normotvorcheskaya/akty/53-prikazy/ 1589. Accessed 25 Sep 2020. (In Russian) 3. Kadam, P.S., Tambade, P.S., Jayant, A.J.: Adaptive packet filtering techniques for Linux firewall. Int. J. Adv. Res. Ideas Innov. Technol. 31, 171–174 (2017) 4. Mohan, R.: Dynamic ordering of firewall rules using a novel swapping windowbased paradigm. In: ACM International Conference Proceeding Series, pp. 11–20 (2016) 5. Trabelsi, Z., Zeidan, S., Masud, M.: Network packet filtering and deep packet inspection hybrid mechanism for IDS early packet matching. In: Proceedings International Conference on Advanced Information Networking and Applications, AINA, pp. 808–815 (2016) 6. Zhu, Y.C.: Optimization design and implementation of gateway based on firewall for access control. In: ICIST 2016 (2016) 7. Saleous, H., Trabelsi, Z.: Enhancing firewall filter performance using neural networks. In: 15th International Wireless Communications and Mobile Computing Conference implementation of Gateway Based on Firewall for Access Control. 6th International Conference on Information Science and TechnWCMC 2019 (2019) 8. Trabelsi, Z., et al.: Improved session table architecture for denial of stateful firewall attacks. IEEE Access 6, 35528–35543 (2018) 9. Trabelsi, Z., Zeidan, S., Masud, M.M.: Hybrid mechanism towards network packet early acceptance and rejection for unified threat management. IET Inf. Secur. 11, 104–113 (2017) 10. Hung, N.M., Nhat, V.D.: B-tree based two-dimensional early packet rejection technique against DoS traffic targeting firewall default security rule. In: Proceedings of the 2014 7th IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2014 (2015) 11. Zhang, L., Huang, M.: A firewall rules optimized model based on service-grouping. In: Proceedings of 12th Web Information System and Application Conference, WISA 2015, 2016 (2015) 12. Abbes, T., Bouhoula, A., Rusinowitch, M.: Detection of firewall configuration errors with updatable tree. Int. J. Inf. Secur. (2016) 13. Saadaoui, A., Ben, Y.B.S.N., Bouhoula, A.: FARE: FDD-based firewall anomalies resolution too. J. Comput. Sci. 23, 181–191 (2017)

Firewall Simulation Model with Filtering Rules Ranking

545

14. Botvinko, A.Yu., Samujlov, K.E.: Razrabotka i issledovanie metodov dinamicheskoj optimizacii pravil filtracii mezhsetevyx ekranov [Development and research of methods for dynamic optimization of firewall filtering rules]. In: 3nd Young Researchers International Conference on the INternet of THings and ITs ENablers: “IoT and 5G”, pp. 28–33 (2017). (In Russian) 15. Botvinko, A.Yu., Samujlov, K.E.: Matematicheskaya model raboty mezhsetevogo ekrana dlya multimedijnogo trafika [Mathematical model of firewall service for multimedia traffic]. T-Comm Telecommun. Transp. 9(12) (2015). (In Russian) 16. Botvinko, A.Yu., Samujlov, K.E.: Adaptivnoe ranzhirovanie nabora pravil mezhsetevogo ekrana metodom lokalnoj approksimacii [Adaptive ranking of the firewall rule set using local approximation]. In: Distributed Computer and Communication Networks: Control, Computation, Communications, DCCN 2018, pp. 334–341 (2018). (In Russian) 17. Botvinko, A.Yu.: Optimizaciya nabora pravil filtracii v mezhsetevyx ekranax [Optimizing the set of filtering rules in firewalls]. In: Vserossijskoj konferencii s mezhdunarodnym uchastiem Moskva [All-Russian conference with international participation Peoples’ Friendship University of Russia], Moscow, 24–28 April 2017. (In Russian) 18. Lebed, S.V.: Mezhsetevoe ekranirovanie. Teoriya i praktika zashhity vneshnego perimetra. [Firewall protection. Theory and practice of external perimeter protection]. Bauman Moscow State Technical University Publication (2002). (In Russian) 19. Laponina, O.R.: Osnovy setevoj bezopasnosti [The foundation of network security]. Moscow. Publishing house of the national Open University INTUIT. Publ. (2014). 377 p. (In Russian) 20. Ivanov, K.V.: Tutubalin P.I.: Markovskie modeli zashhity avtomatizirovannyx sistem upravleniya specialnogo naznacheniya [Markov models of protection of automated control systems for special purposes]. Kazan. Publishing house of GBU Republican center for monitoring the quality of education (2012). 216 p. (In Russian) 21. Katkovnik, V.Ya.: Neparametricheskaya identifikaciya i sglazhivanie dannyx: metod lokalnoj approksimacii [Non-parametric data identification and smoothing: local approximation method]. The science. Main editorial office of physical and mathematical literature Publ. (1985). (In Russian) 22. Buslenko, N.P.: Modelirovanie slozhnyx sistem [Modeling complex systems]. The science. Main editorial office of physical and mathematical literature Publ. (1978). 400 p. (In Russian) 23. Apanasovich, V.V., Tixonenko, O.M.: Cifrovoe modelirovanie stoxasticheskix sistem [Digital modeling of stochastic systems]. Minsk. University Publ. (1986). 126 p. (In Russian) 24. Kotkova, E.A., Antyuxov, V.I.: Cistemnyj podxod k raschetu parametrov slozhnyx sistem [Systematic approach to calculating the parameters of complex systems], vol. 3. Credo new. Publ. (2019). (In Russian) 25. Akopov, A.S.: Imitacionnoe modelirovanie: uchebnik i praktikum dlya akademicheskogo bakalavriata [Simulation modeling: textbook and practicum for academic baccalaureate students]. Moscow. Urait Publ. (2016). 389 p. (In Russian) 26. Saadaoui, A., Ben, Y.B.S.N., Bouhoula, A.: FARE: FDD-based firewall anomalies resolution tool. J. Comput. Sci. 23, 181–191 (2017)

Performance of Forward Error Correction in Transport Protocol at Intrasegment Level P. V. Pristupa(B) , P. A. Mikheev, and S. P. Suschenko Tomsk State University, Tomsk, Russia [email protected], [email protected], [email protected]

Abstract. In this paper we propose a transport connection model managed by reliable transport protocol with forward error correction (FEC) in the modes of selective and group reject in the form of a discrete-time Markov chain. It takes into account the influence on the transport connection throughput by protocol parameters (window size and acknowledge time-out duration), error level in the communication channels of the data transmission path, round-trip delay, and forward error correction process parameters. We assessed the benefits of the transport protocol with FEC over the classic transport protocol in the multidimensional feature space of influencing variable values. Keywords: Transport protocol · Forward error correction · Data transmission path · Markov chain · Transport connection throughput Window size · Time-out duration · Round-trip delay · Loss value

1

·

Introduction

Transport connection throughput is the most important quality indicator of interactions between network applications and respective software and hardware. This performance indicator is mostly defined by transport protocol and its parameters – window size and time-out duration [1]. Subscriber connection modeling and its potential analysis was conducted in [2–11] et al. Mathematical modeling of a classic transport protocol with a decision feedback was conducted in [2–8], simulation modeling of protocol performance was conducted in [9,10]. But these results were obtained under significant limitations on protocol parameters and factors, that define the performance of transport connection. In [11] the model of subscriber competition over the transport connection throughput is proposed, but only for the case of selective retry. In the modern transport protocols the FEC technologies [12–19] are becoming commonplace. An example of the like technology is the QUIC protocol by Google [12]. In [13,14] the researchers performed a simulation modeling of a series of transport protocol scenarios with the capabilities of the simplest FEC mechanisms for wired and wireless communication environments. FEC technology appropriateness in the c Springer Nature Switzerland AG 2020  V. M. Vishnevskiy et al. (Eds.): DCCN 2020, CCIS 1337, pp. 546–556, 2020. https://doi.org/10.1007/978-3-030-66242-4_43

Performance of Forward Error Correction in Transport Protocol

547

real-time applications for multimedia traffic is illustrated in the full-scale studies [15–18]. Complexity of corrupted data recovery, costs and possible technological restrictions in various communication media are also estimated there. A mathematical model of transport protocol with FEC in the intersegment space is discussed in [19]. We found the areas of preferable usage for this technology over the reduced feature space of parameters, characteristics and factors that define the FEC efficiency. But the research on the efficiency of FEC methods [12–19] was conducted primarily on a qualitative level, using numeric and test-bench experiments with significant limitations over communication channel characteristics and parameters of data transfer protocols and error correction protocols. In the paper we address the mathematical model of transport connection in the phase of information transfer managed by reliable transport protocol with a FEC mechanism in the form of a discrete-time Markov chain. On the basis of this model we suggest the analysis of conditions that grant an advantage over the classic transport protocol in transport protocol performance with FEC technology in the space of each segment.

2

Transport Connection Model

Let’s examine the data transfer process between the subscribers of the transport protocol based on the algorithm with a decision feedback [1] in the modes of selective or group reject. TCP protocol [1], dominant in the contemporary computer networks, is considered as an example of a family of the like reliable protocols. In the selective reject mode the source has to retransmit only the protocol data blocks (segments) not received, but in the group reject mode the source has to retransmit every block starting from a not received one [1]. We assume the interacting subscribers have unlimited data stream for transfer using the protocol data blocks (segments) of the same length. The receiver’s acknowledgments about the correct receiving of data are transmitted in the segments of counterstream. We assume the managing transport protocol has additional logic for intrasegment FEC. This way, before transmitting each segment, the source divides each segment into A ≥ 1 fragments of the same size, adds B − A, B ≥ A redundant fragments of the same length and transmits an extended segment consisting of B fragments into transport connection. Each fragment is accompanied by service data allowing to reveal possible errors and restore the original segment from B fragments in the reception point. If up to B − A arbitrary fragments of extended segment get corrupted, the receiver is still able to recover the original segment and avoid initiating retransmissions (see Fig. 1). Let ff and fr be confidence of fragment transmission along the transport connection from source to receiver and back, respectively. This way the probability of original segment delivery to the receiver, provided the receiver can B  CiB ff i (1 − ff )B−i , recover it using the FEC mechanism, is defined as Ψf = i=A

confidence of sender receiving the acknowledgment about the safe receipt is

548

P. V. Pristupa et al.

Fig. 1. Transport protocol with intrasegment FEC.

Ψr =

B  i=A

CiB fr i (1 − fr )B−i . These parametric dependencies from A and B define

the mathematical model of different FEC methods. We consider that the links along the data transmission path have the same speed of operation in both directions, and duration of extended segment transmission cycle in a individual link equals t. Authors believe that assuming homogeneous links with the same transfer duration t is safe enough as in case of different duration for different links (t1 , t2 , ..., tn ) we always able to consider links as a number of smaller links connected in series that have a smaller duration t dividing each of ti . In a general case the length of path from source to receiver, used for transmitting the data stream, could be different from the reverse path, used for transmitting the acknowledgments about receiving the segments. Let’s assume the length of data transmission path, expressed in the number of hops in the forward direction equals Df ≥ 1. The reverse path, used for transmitting acknowledgments about the correct receiving of segment sequences to the sender, is of length Dr ≥ 1. Let’s assume there is no segment loss due to buffer memory blockage in the path nodes. Data stream management is enabled by the mechanism of sliding window [1] of size W ≥ 1. The data transfer process in the transport connection could be expressed as a Markov process with discrete time expressed in multiples of cycle duration t, because the time between receiving acknowledgments has a geometric distribution

Performance of Forward Error Correction in Transport Protocol

549

with parameter Ψr [2]. The Markov chain defines the sender activity and the changes in the size of a queue of extended segments awaiting confirmation in the source. Number of Markov chain states is defined by acknowledge time-out duration S, expressed in number of cycles of duration t. Time-out duration is related to the data transmission path length and window size by inequalities S > W , S ≥ Df + Dr . The sum of forward and reverse data transmission paths could be interpreted as round-trip delay D = Df + Dr , measured in durations t (not including the loss of protocol blocks during transmission along the path). Once a segment is sent, the sender stores the segment ID in a queue. The more segments are sent, the bigger the queue becomes. After getting an acknowledgment the sender removes the corresponding segment IDs from the queue. The states of Markov chain i = 0, W represent the number of segments that were transmitted by the sender, but not acknowledged, the states i = W + 1, S − 1 represent the time periods, when the sender is not active and waits to receive the acknowledgments about the correct receiving of segment sequence consisting of W segments. The source moves from the zero state into D − 1th state along each cycle t with a probability of determined event. In the states i ≥ D − 1 after the next discrete cycle t expires, the sender starts to receive the acknowledgments and, depending on the state of receipt, the sender either transmits the new segments (if receipt is confirmed), or the sender resends the corrupted segments. Finishing the cycle in the state D −1 corresponds to the time of transmitting the first segment to the receiver and receiving the acknowledgment of receipt. Further increase in the state index occurs with the probability of acknowledgment corruption 1 − Ψr in the reverse path. In the states i ≥ D − 1 in the selective reject mode the confirmation triggers moving to the state D − 1, provided W ≥ D, or to the state D + W − 2 − i, provided W ≤ D. In the group reject mode the initial states i ≥ D − 1 return in the states D − 1 (provided W ≥ D) or D + W − 2 − i (provided W ≤ D) upon receiving the acknowledgment only in case of successful transmission of i − D + 1 extended segments to the receiver, otherwise the sender returns to the zero state, because the queue of transmitted, but not acknowledged, segments resets to zero. As the source stops transmitting the segments in the states i ≥ W , receiving the acknowledgments in the states i = W, D + W − 3 results in moving into the states D + W − 2 − i, and from the states i = D + W − 2, S − 2 – into the zero state. It is true for selective reject mode, but in a group reject mode these changes in the states are implemented after receiving the positive acknowledgments. In the state S −1 the time-out of waiting for acknowledgment from the receiver about receiving the segments in a correct way expires, and the sender moves into the zero state in any reject mode.

3

Probabilistic and Temporal Characteristics of the Transport Connection

Markov chain transition probabilities define the description of an information stream transmission process from the initial state i into the resulting state j

550

P. V. Pristupa et al.

with a FEC technology in the group reject mode: ⎧ 1, j = i + 1, i = 0, D − 2; ⎪ ⎪ ⎪ ⎪ ⎪ ⎪1 − Ψr , j = i + 1, i = D − 1, S − 2; ⎪ ⎪ ⎪ ⎪ Ψr Ψf i−D+2 , j = D − 1, i = D − 1, W − 1, W ≥ D; ⎪ ⎪ ⎪ i−D+2 ⎪ ⎪ ), j = 0, i = D − 1, W − 1, W ≥ D; ⎨Ψr (1 − Ψf i−D+2 πij = Ψr Ψf , j = D + W − 2 − i, i = D − 1, D + W − 3, W ≤ D; ⎪ ⎪ ⎪ Ψr (1 − Ψf i−D+2 ), j = 0, i = D − 1, D + W − 3, W ≤ D; ⎪ ⎪ ⎪ ⎪ ⎪ Ψr Ψf i−D+2 , j = D + W − 2 − i, i = W, D + W − 3, W ≥ D; ⎪ ⎪ ⎪ ⎪ ⎪Ψr , j = 0, i = D + W − 2, S − 2; ⎪ ⎪ ⎩ 1, j = 0, i = S − 1.

(1)

For the selective reject mode transition probabilities could be obtained from this equation provided Ψf = 1, as the transitions from the confidence state of segment delivery to the receiver are independent. Probability distribution of states for the Markov chain with the described transition probability structure is defined by relations between the protocol parameters W , S, and round-trip delay duration D. It has a functional view, obtained in [2]. The most important operational characteristic of a protocol is its throughput, defined by the data transmission path parameters, overhead and features of the protocol procedures of transmission management [1,2]. Normalized performance of transport connection is defined by the average number of uncorrupted segments delivered to the receiver (taking into account the reject mode [1]) over the average time between two consequent incoming acknowledgments [2]. As the time between two incoming acknowledgments is distributed geometrically with the parameter Ψr , the average time between two incoming acknowledgments in the cycle durations t will be defined as T = 1/Ψr . Thus the throughput for the selective reject procedure is defined as [2]: Zs (W, S, D, A, B) = Ψr

D+W −2 i=D−1

S−1 

(i − D + 2)Ψf Pi + W Ψf

Pi .

(2)

i=D+W −1

Transport connection throughput for group reject mode taking into account the retransmission of every segment starting from the first not received one [2] is defined as: Zg (W, S, D, A, B) = Ψf Ψr

D+W −2 i=D−1

4

1 − Ψf i−D+2 1 − Ψf W Pi + 1 − Ψf 1 − Ψf

S−1 

Pi . (3)

i=D+W −1

Areas of Appropriateness for Applying the Forward Error Correction

Let’s examine the efficiency of FEC technology on the protocol data blocks on the level of reliable transport protocol in the space of each segment. According

Performance of Forward Error Correction in Transport Protocol

551

to the FEC technology procedure the sender divides every data segment into A fragments of the same length, adds B − A ≥ 0 redundant fragments of the same size to these fragments, allowing to restore the segment on the receiving side even if up to B − A arbitrary fragments of extended segment get corrupted. The receiver, upon receiving the extended segment with corrupted fragments, tries to recover it and, if successful, sends an acknowledgment to the sender, packed in the similar extended data segment of counterstream. Efficient use of FEC technology assumes finding the values for segment fragmentation coefficient A and number of additional redundant fragments B − A for error correction, that grant maximum performance of transport connection with predetermined characteristics and protocol parameters. Redundant fragments in the transmitted sequence increase the probability of segment delivery to the receiver, but this increase is achieved by increase in overhead in the form of time needed for transmitting the additional data. This rises the need to find in the multidimensional feature space an area of transport connection characteristic values (D, Ψr , Ψf ), transport protocol parameters (W , S) and FEC mechanism (A, B), that grant the superiority of FEC management procedure over the classic protocol procedure with a decision feedback without employing the error correction. Let’s compare the management procedures provided the subscribers’ data streams have the same transmission rate. Let’s define the gain in performance due to employing the FEC mechanism in comparison with the classic protocol procedure with a decision feedback in the form of: Δ(A, B) = Z(W, S, D, A, B) − Z(W, S, D, 1, 1). Let’s analyze the gain values not including the overhead related to adding extra headers and trailers to each fragment of the source segment for error diagnostics and correct segment assembling from a set of fragments. In the general case the comparative analysis could be performed only computationally. In several cases the area of positive values of gain could be found in a simple analytic form thanks for lowering the number of dimensions of feature space. In the selective reject mode with the completely reliable reverse data transmission path (fr = 1), gain takes a simple analytic form, invariant to the window AΨ size Δs (A, B) = B f −ff A , assuming W ≥ D, and dependent on the window size AΨf A 1 Δs (A, B) = D−W +1 ( B − ff ), assuming W < D. Thus, for the FEC parameters satisfying the condition B = A + 1, A ≥ 1, it is evident that an area of A2 f positive values of gain Δs (A, A+1) = ff A (A−1− A+1f ) exists for A ≥ 2 over the interval ff ∈ (0, 1 −

1 A2 ).

The maximum value of gain Δs (A, A + 1) = A+1

(A−1)A+1 AA (A+1)

(A−1) assuming W ≥ D and Δs (A, A + 1) = AA (A+1)(D−W assuming W < D is +1) 1 achieved for ff = 1 − A . As the FEC parameter A increases, the maximum of gain moves to the right on the coordinate ff , and the maximum gain value grows from Δs (2, 3) = 1/12 and Δs (2, 3) = 1/12(D − W + 1) assuming W ≥ D and W < D respectively (see Fig. 2).

552

P. V. Pristupa et al.

Fig. 2. Benefit function Δs (A, B, ff ) where fr = 1, W ≥ D, B = A + 1 for different values of A. The positive values area of the benefit function determines the applicability of using FEC.

For the FEC process parameters B = A + 2, A ≥ 1 the positive values of gain are achieved on the interval ff ∈ (0, (A−1)(A+2) A(A+1) ), A ≥ 2, and the maximum  2 of gain is achieved for ff = 1 − A(A+1) (see Fig. 3). In the group repeat mode for a completely reliable reverse data transmission AΨf ff A − D−(J−1)f path (fr = 1) the gain becomes Δg (A, B) = B[D−(J−1)Ψ A , where f] f J = W provided W < D and J = D provided W ≥ D. Then the positive values of gain, provided A = 1, B = 2, are achieved for confident fragment transmission in the forward data path of transport connection on the intervals ff ∈ (0, D−2 D−1 ), D D W ≥ D, D > 2 and ff ∈ (0, 2 − W −1 ), 1 + 2 < W < D (see Fig. 4, Fig. 5 and Fig. 6). On the Fig. 5 we can see that for W = 3 the benefit function is negative on the whole range of ff . In such cases it practically means that FEC mechanism should not be used. For loaded transport connection (W ≥ D) as the round-trip delay D increases the area of gain positive values expands, maximum of gain increases over the curve with saturation and shifts to the area of higher confidence of fragment delivery ff . The dependency of gain on parameter A is an extreme one provided B = A + 1, A ≥ 1. For underloaded transport connection (1 + D 2 < W < D) with the window extension from W = 1 + D to W = D − 1 the area of positive 2

Performance of Forward Error Correction in Transport Protocol

553

Fig. 3. Benefit function Δs (A, B, ff ) where fr = 1, W ≥ D, B = A + 2 for different values of A.

Fig. 4. Benefit function Δg (A, B, ff ) where fr = 1, W ≥ D, B = A + 1 for different values of D.

554

P. V. Pristupa et al.

Fig. 5. Benefit function Δg (A, B, ff ) where fr = 1, W < D, D = 16, B = A + 1 for different values of W .

Fig. 6. Benefit function Δg (A, B, ff ) where fr = 1, W < D, W = 10, B = A + 1 for different values of D.

Performance of Forward Error Correction in Transport Protocol

555

values of gain extends on the coordinate ff , maximum of gain increases and shifts to the right. The same effect has an increase in a FEC parameter A for B = A + 1. If the condition W = 1 + D 2 is satisfied, increase in round-trip delay duration D makes the area of positive values of gain narrower on the coordinate ff , lowering the benefits of FEC technology. It should be noted that, other things being equal, size of the fragments decreases with the increase of coefficient of segment division into fragments (parameter A), so the confidence of delivery to the recipient ff increases as well. Thus, in order to perform a correct benchmark of gain on different values of the parameter A, we need to employ the indicator of delivery reliability for an individual bit, byte or word.

5

Conclusion

In this paper we propose a model for a process of data segment transmission in a transport connection, managed by reliable transport protocol with FEC technology, implemented in the space of every segment, and acknowledgment of data, received after applying the FEC procedure. It is shown, that for every mode of repeating, FEC mechanism usage is appropriate and especially beneficial in the fully loaded transport connections (W ≥ D) with a significant round-trip delay (D). In general, the FEC benefit in any reject mode is mostly defined by confidence of fragment delivery (ff and fr ), source segment fragmentation parameters (A) and redundant data (B), as well as ratio between the window size and round-trip delay duration. Further analysis may include the problem of researching the operational characteristics of transport connections, under contention between subscribers for available bandwidth of shared links in the network path. Furthermore, an important task is generalizing the results obtained in this paper over the case of competitive use of connection path throughput over various subscriber connections with shared channels of data transmission path. Also, it seems reasonable to consider buffer memory blockage in the path nodes as an additional aspect of the model.

References 1. Fall, K., Stevens, R.: TCP/IP Illustrated, Volume 1: The Protocols, 2nd edn., p. 1017. Addison-Wesley Professional Computing Series (2012) 2. Kokshenev, V.V., Mikheev, P.A., Sushchnenko, S.P.: Comparative analysis of the performance of selective and group repeat transmission models in a transport protocol. Autom. Remote Control 78(2), 247–261 (2017) 3. Kokshenev, V., Mikheev, P., Suschenko, S., Tkachyov, R.: Analysis of the throughput in selective mode of transport protocol. In: Vishnevskiy, V.M., Samouylov, K.E., Kozyrev, D.V. (eds.) DCCN 2016. CCIS, vol. 678, pp. 168–181. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-51917-3 16 4. Bogushevsky, D., Mikheev, P., Pristupa, P., Suschenko, S.: The time-out length influence on the available bandwidth of the selective failure mode of transport protocol in the load data transmission path. In: Vishnevskiy, V.M., Kozyrev, D.V. (eds.) DCCN 2018. CCIS, vol. 919, pp. 120–131. Springer, Cham (2018). https:// doi.org/10.1007/978-3-319-99447-5 11

556

P. V. Pristupa et al.

5. Kassa, D.F.: Analytic Models of TCP Performance, p. 199. PhD Thesis, University of Stellenbosch (2005) 6. Giordano, S., Pagano, M., Russo, F., Secchi, R.: Modeling TCP startup performance. J. Math. Sci. 200(4), 424–431 (2014) 7. Kravets, O.Y.: Mathematical modeling of parameterized TCP protocol. Autom. Remote Control 74(7), 1218–1224 (2013) 8. Arvidsson, A., Krzesinski, A.: A model of a TCP link. In: Proceedings of the 15th International Teletraffic Congress Specialist Seminar (2002) 9. Olsen, Y.: Stochastic modeling and simulation of the TCP protocol. Uppsala Dissertations in mathematics, vol. 28, p. 94 (2003) 10. Mikheev, P., Pristupa, P., Suschenko, S.: Performance of transport connection with selective failure mode when competing for throughput of data transmission path. In: Vishnevskiy, V.M., Samouylov, K.E., Kozyrev, D.V. (eds.) DCCN 2019. CCIS, vol. 1141, pp. 89–103. Springer, Cham (2019). https://doi.org/10.1007/978-3-03036625-4 8 11. Nikitinskiy, M.A., Chalyy, D.J.: Performance analysis of trickles and TCP transport protocols under high-load network conditions. Autom. Control Comput. Sci. 47(7), 359–365 (2013) 12. Langley, A., et al.: Protocol: design and internet-scale deployment. In: SIGCOMM 2017, Los Angeles. CA, USA 2017, pp. 183–196 (2017) 13. Lundqvist, H., Karlsson, G.: TCP with end-to-end FEC, pp. 152–156. International Zurich Seminar on Communications (2004) 14. Barakat, C., Altman, E.: Bandwidth tradeoff between TCP and link-level FEC. Comput. Netw. (39), pp. 133–150 (2002) 15. Shalin, R., Kesavaraja, D.: Multimedia data transmission through TCP/IP using hash based FEC with AUTO-XOR scheme. ICTACT J. Commun. Technol. 03(03), 604–609 (2012) 16. Ribadeneir, A.F.: An Analysis of the MOS under condition of delay, jitter and packet loss and an analysis of the impact of introducing piggybacking and Reed Solomon FEC for VOIP. Master’s thesis, Georgia State University (2007) 17. Matsuzono, K., Detchart, J., Cunche, M., Roca, V., Asaeda, H.: Performance analysis of a high-performance real-time application with several AL-FEC schemes. In: Proceedings of the IEEE 35th Conference on Local Computer Networks, LCN 2010, pp. 1–7 (2010) 18. Herrero, R.: Modeling and comparative analysis of Forward Error Correction in the context of multipath redundancy. Telecommun. Syst. Modell. Anal. Des. Manag. 65(4), 783–794 (2017) 19. Mikheev, P., Suschenko, S., Tkachyov, R.: Estimation of high-speed performance of the transport protocol with the mechanism of forward error correction. In: Vishnevskiy, V.M., Samouylov, K.E., Kozyrev, D.V. (eds.) DCCN 2017. CCIS, vol. 700, pp. 259–268. Springer, Cham (2017). https://doi.org/10.1007/978-3-31966836-9 22

Author Index

Abaev, Pavel 221 Abdellah, Ali R. 18 Abrosimov, L. I. 70 Alexandrov, Alexander 82 Alikin, Konstantin 472 Anikina, E. V. 144 Anilkumar, M. P. 206 Apatova, N. V. 484 Araniti, Giuseppe 3 Artem, Volkov 18 Ayryan, Edik A. 422 Babu, Dhanya 183 Bács, Zoltán 171 Barabanova, E. A. 57 Bogatyrev, Stanislav 464 Bogatyrev, Vladimir 464 Borodina, Alexandra 353 Botvinko, Anatoly 533 Boychenko, O. V. 484 Brekhov, Oleg 311 Chukhno, Nadezhda Chukhno, Olga 3

3

Demidova, Anastasia V. 422 Dorokhin, Semyon 105 Dushin, Sergey 510 Fitsov, Vadim

382

Gallyamov, Denis 18 Gavrikov, I. V. 484 Gerdt, V. P. 129 Goldstein, Boris 382 Iera, Antonio 3 Ivanov, Andrey 43 Ivanova, Nika 271 Jankūnienė, R. 450 Japertas, S. 450

Jose, K. P. 206 Joshua, V. C. 183, 195 Kalashnikov, A. O. 144 Khayou, H. 70 Kirichek, Ruslan 497 Korolyov, O. L. 484 Kotkova, E. A. 129 Koucheryavy, Andrey 18 Krishnamoorthy, A. 183, 195 Kulyabov, Dmitry S. 422 Laptin, V. A. 259 Larionov, Andrey 30 Maltseva, Maria 340 Mamonov, Anton 521 Mandel, A. S. 259 Marochkina, A. 247 Mikhailov, E. A. 117 Mikheev, P. A. 546 Molinaro, Antonella 3 Monov, Vladimir 82 Morozov, Evsey 340, 394 Morozov, Vitaly 472 Mukhtarov, Amir 30 Muthanna, Ammar 18 Natalia, Ziazina 43 Nazarov, A. A. 327 Nekrasova, Ruslana 299 Nikolaevtsev, Viktor 94 Paramonov, A. I. 235, 247 Pershin, Oleg 30 Peshkova, Irina 340 Phuong, Nguyen Duy 117 Pintér, Ákos 171 Pizzi, Sara 3 Podlazov, V. S. 57 Pristupa, P. V. 546

558

Author Index

Rassadin, Yury 510 Rozhkova, S. V. 327 Rudenkova, M. 70 Salpagarov, Soltan 521 Samouylov, Konstantin 533 Sazonov, Dmitriy 497 Sevastianov, Leonid A. 422 Shamilova, R. V. 235 Shchetinin, Eugene Yu. 422 Shirokov, V. L. 158 Shorokhov, S. G. 407 Sinu Lal, T. S. 195 Suchkov, Dmitry 94 Suchkov, Sergey 94 Suschenko, S. P. 546 Sztrik, János 171 Tatarnikova, T. M. 235, 247 Tishenko, Vitaliy 353

Titarenko, E. Yu. 327 Tóth, Ádám 171 Tóth, László 437 Tsarev, Alexey 221 Tsitovich, Ivan 286

Uzakov, T. K. 484

Vanin, Alexey 464 Varlamov, Ruslan 521 Vas, Ádám 437 Veronika, Antonova 43 Vishnevsky, V. M. 30, 57, 117 Vytovtov, K. A. 57

Zhukova, Ksenia 394 Zverkina, Galina 367